DIRAC is a distributed resource framework. In affected versions any user could get a token that has been requested by another user/agent. This may expose resources to unintended parties. This issue has been addressed in release version 8.0.37. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/DIRACGrid/DIRAC/commit/f9ddab755b9a69acb85e14d2db851d8ac0c9648c | Patch |
| https://github.com/DIRACGrid/DIRAC/security/advisories/GHSA-59qj-jcjv-662j | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-09 00:15
Updated : 2024-02-16 21:37
NVD link : CVE-2024-24825
Mitre link : CVE-2024-24825
CVE.ORG link : CVE-2024-24825
JSON object : View
Products Affected
diracgrid
- dirac
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
