Vulnerability Description
Lack of privilege checking when processing a redaction in Conduit versions v0.6.0 and lower, allowing a local user to redact any message from users on the same server, given that they are able to send redaction events.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Conduit | Conduit | < 0.7.0 |
Related Weaknesses (CWE)
References
- https://conduit.rs/changelog/#v0-7-0-2024-04-25Release Notes
- https://gitlab.com/famedly/conduit/-/releases/v0.7.0Release Notes
- https://conduit.rs/changelog/#v0-7-0-2024-04-25Release Notes
- https://gitlab.com/famedly/conduit/-/releases/v0.7.0Release Notes
FAQ
What is CVE-2024-6302?
CVE-2024-6302 is a vulnerability with a CVSS score of 8.1 (HIGH). Lack of privilege checking when processing a redaction in Conduit versions v0.6.0 and lower, allowing a local user to redact any message from users on the same server, given that they are able to send...
How severe is CVE-2024-6302?
CVE-2024-6302 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6302?
Check the references section above for vendor advisories and patch information. Affected products include: Conduit Conduit.