CVE-2024-43397

Source
https://cve.org/CVERecord?id=CVE-2024-43397
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43397.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43397
Aliases
Published
2024-08-20T14:50:01.163Z
Modified
2026-04-15T11:03:33.283976Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Potential unauthorized access issue in apollo-portal
Details

Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.

Database specific
{
    "cwe_ids": [
        "CWE-284"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43397.json",
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "fixed": "2.3.0"
                }
            ],
            "source": "AFFECTED_FIELD"
        }
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/apolloconfig/apollo

Affected ranges

Type
GIT
Repo
https://github.com/apolloconfig/apollo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.3.0"
        }
    ]
}

Affected versions

0.*
0.6.2
v0.*
v0.10.0
v0.10.1
v0.10.2
v0.11.0
v0.5.0
v0.6.0
v0.6.3
v0.7.0
v0.8.0
v0.9.0
v0.9.1
v1.*
v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.3.0
v1.4.0
v1.5.0
v1.6.0
v1.7.0
v1.8.0
v1.9.0
v2.*
v2.0.0
v2.0.0-RC1
v2.0.1
v2.1.0
v2.2.0

Database specific

vanir_signatures
[
    {
        "target": {
            "file": "apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/entity/model/NamespaceSyncModel.java"
        },
        "source": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "252361781893128610831119860120716564120",
                "241986941767300582401186021421404527590",
                "267759248037966548381652108870486947456"
            ]
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2024-43397-51818ddb"
    },
    {
        "target": {
            "function": "update",
            "file": "apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/controller/ItemController.java"
        },
        "source": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed",
        "deprecated": false,
        "digest": {
            "length": 823.0,
            "function_hash": "240805218289294193921827074991494796769"
        },
        "signature_type": "Function",
        "signature_version": "v1",
        "id": "CVE-2024-43397-d9d24912"
    },
    {
        "target": {
            "file": "apollo-portal/src/main/java/com/ctrip/framework/apollo/portal/controller/ItemController.java"
        },
        "source": "https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "11016624441191631595763362316640120630",
                "242111561994901883686430695799157596485",
                "24152801020650701272081069733587756050",
                "305294074042114408557474320716928347875"
            ]
        },
        "signature_type": "Line",
        "signature_version": "v1",
        "id": "CVE-2024-43397-e57d8c43"
    }
]
vanir_signatures_modified
"2026-04-15T11:03:33Z"
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43397.json"