Vulnerability Description
In Eclipse Kura LogServlet component included in versions 5.0.0 to 5.4.1, a specifically crafted request to the servlet can allow an unauthenticated user to retrieve the device logs. Also, downloaded logs may be used by an attacker to perform privilege escalation by using the session id of an authenticated user reported in logs. This issue affects org.eclipse.kura:org.eclipse.kura.web2 version range [2.0.600, 2.4.0], which is included in Eclipse Kura version range [5.0.0, 5.4.1]
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eclipse | Kura | >= 5.0.0, <= 5.4.1 |
Related Weaknesses (CWE)
References
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/188Issue TrackingVendor Advisory
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/188Issue TrackingVendor Advisory
FAQ
What is CVE-2024-3046?
CVE-2024-3046 is a vulnerability with a CVSS score of 7.5 (HIGH). In Eclipse Kura LogServlet component included in versions 5.0.0 to 5.4.1, a specifically crafted request to the servlet can allow an unauthenticated user to retrieve the device logs. Also, downloaded ...
How severe is CVE-2024-3046?
CVE-2024-3046 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3046?
Check the references section above for vendor advisories and patch information. Affected products include: Eclipse Kura.