Skip to content

Commit ae38cb9

Browse files
1 parent d978a30 commit ae38cb9

File tree

1 file changed

+29
-4
lines changed

1 file changed

+29
-4
lines changed

advisories/unreviewed/2025/01/GHSA-g9gf-g5jq-9h3v/GHSA-g9gf-g5jq-9h3v.json advisories/github-reviewed/2025/01/GHSA-g9gf-g5jq-9h3v/GHSA-g9gf-g5jq-9h3v.json

+29-4
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g9gf-g5jq-9h3v",
4-
"modified": "2025-01-27T21:30:53Z",
4+
"modified": "2025-01-27T22:57:20Z",
55
"published": "2025-01-22T00:33:36Z",
66
"aliases": [
77
"CVE-2024-45479"
88
],
9+
"summary": "Apache Ranger UI vulnerable to Server Side Request Forgery",
910
"details": "SSRF vulnerability in Edit Service Page of Apache Ranger UI in Apache Ranger Version 2.4.0.\nUsers are recommended to upgrade to version Apache Ranger 2.5.0, which fixes this issue.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.apache.ranger:ranger"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.5.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,10 @@
2344
"type": "WEB",
2445
"url": "https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/apache/ranger"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "http://www.openwall.com/lists/oss-security/2025/01/21/4"
@@ -33,8 +58,8 @@
3358
"CWE-20"
3459
],
3560
"severity": "CRITICAL",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-01-27T22:57:20Z",
3863
"nvd_published_at": "2025-01-21T22:15:12Z"
3964
}
4065
}

0 commit comments

Comments
 (0)