← Zuruck zu CVEs
CVE-2023-34409
CRITICAL9.8
Beschreibung
In Percona Monitoring and Management (PMM) server 2.x before 2.37.1, the authenticate function in auth_server.go does not properly formalize and sanitize URL paths to reject path traversal attempts. This allows an unauthenticated remote user, when a crafted POST request is made against unauthenticated API routes, to access otherwise protected API routes leading to escalation of privileges and information disclosure.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/6/2023
Zuletzt geandert1/8/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
percona:monitoring_and_management
Schwachen (CWE)
CWE-22CWE-22
Referenzen
https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/(cve@mitre.org)
https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.