CVE-2024-27916

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27916
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27916.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27916
Aliases
Related
Published
2024-03-21T02:52:20Z
Modified
2025-01-08T15:56:58.234915Z
Summary
[none]
Details

Minder is a software supply chain security platform. Prior to version 0.0.33, a Minder user can use the endpoints GetRepositoryByName, DeleteRepositoryByName, and GetArtifactByName to access any repository in the database, irrespective of who owns the repo and any permissions present. The database query checks by repo owner, repo name and provider name (which is always github). These query values are not distinct for the particular user - as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. Version 0.0.33 contains a patch for this issue.

References

Affected packages

Git / github.com/mindersec/minder

Affected ranges

Type
GIT
Repo
https://github.com/mindersec/minder
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.0.1
v0.0.10
v0.0.11
v0.0.12
v0.0.13
v0.0.14
v0.0.15
v0.0.16
v0.0.17
v0.0.18
v0.0.19
v0.0.2
v0.0.20
v0.0.21
v0.0.22
v0.0.23
v0.0.24
v0.0.25
v0.0.26
v0.0.27
v0.0.28
v0.0.29
v0.0.3
v0.0.30
v0.0.31
v0.0.32
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9