Show plain JSON{"id": "CVE-2024-24770", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2024-03-14T19:15:49.973", "references": [{"url": "https://github.com/vantage6/vantage6/commit/aecfd6d0e83165a41a60ebd52d2287b0217be26b", "source": "security-advisories@github.com"}, {"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-45gq-q4xh-cp53", "source": "security-advisories@github.com"}, {"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-5h3x-6gwf-73jm", "source": "security-advisories@github.com"}, {"url": "https://github.com/vantage6/vantage6/commit/aecfd6d0e83165a41a60ebd52d2287b0217be26b", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-45gq-q4xh-cp53", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-5h3x-6gwf-73jm", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-208"}, {"lang": "en", "value": "CWE-362"}]}], "descriptions": [{"lang": "en", "value": "vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. Much like GHSA-45gq-q4xh-cp53, it is possible to find which usernames exist in vantage6 by calling the API routes `/recover/lost` and `/2fa/lost`. These routes send emails to users if they have lost their password or MFA token. This issue has been addressed in commit `aecfd6d0e` and is expected to ship in subsequent releases. Users are advised to upgrade as soon as a new release is available. There are no known workarounds for this vulnerability."}, {"lang": "es", "value": "vantage6 es un framework de c\u00f3digo abierto creado para habilitar, administrar e implementar tecnolog\u00edas que mejoran la privacidad, como el aprendizaje federado y la computaci\u00f3n multipartita. Al igual que GHSA-45gq-q4xh-cp53, es posible encontrar qu\u00e9 nombres de usuario existen en vantage6 llamando a las rutas API `/recover/lost` y `/2fa/lost`. Estas rutas env\u00edan correos electr\u00f3nicos a los usuarios si han perdido su contrase\u00f1a o token MFA. Este problema se solucion\u00f3 en el commit \"aecfd6d0e\" y se espera que se incluya en versiones posteriores. Se recomienda a los usuarios que actualicen tan pronto como est\u00e9 disponible una nueva versi\u00f3n. No se conocen workarounds para esta vulnerabilidad."}], "lastModified": "2024-11-21T08:59:39.977", "sourceIdentifier": "security-advisories@github.com"}