Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-qfv2-3p2f-vg48: Duplicate Advisory: Central Dogma Authentication Bypass Vulnerability via Session Leakage

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-34q3-p352-c7q8. This link is maintained to preserve external references.

Original Description

Central Dogma versions prior to 0.64.0 is vulnerable to Cross-Site Scripting (XSS), which could allow for the leakage of user sessions and subsequent authentication bypass.

ghsa
#xss#vulnerability#git#java#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-qfv2-3p2f-vg48

Duplicate Advisory: Central Dogma Authentication Bypass Vulnerability via Session Leakage

Moderate severity GitHub Reviewed Published Feb 2, 2024 to the GitHub Advisory Database • Updated Feb 2, 2024

Withdrawn This advisory was withdrawn on Feb 2, 2024

Package

maven com.linecorp.centraldogma:centraldogma-server (Maven)

Affected versions

< 0.64.0

Published by the National Vulnerability Database

Feb 2, 2024

Published to the GitHub Advisory Database

Feb 2, 2024

ghsa: Latest News

GHSA-7p9f-6x8j-gxxp: CRI-O: Maliciously structured checkpoint file can gain arbitrary node access