{"id":"CVE-2024-43397","summary":"Potential unauthorized access issue in apollo-portal","details":"Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.","aliases":["GHSA-c6c3-h4f7-3962"],"modified":"2025-12-05T05:59:01.672561Z","published":"2024-08-20T14:50:01.163Z","database_specific":{"cwe_ids":["CWE-284"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43397.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43397.json"},{"type":"FIX","url":"https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed"},{"type":"FIX","url":"https://github.com/apolloconfig/apollo/pull/5192"},{"type":"WEB","url":"https://github.com/apolloconfig/apollo/releases/tag/v2.3.0"},{"type":"ADVISORY","url":"https://github.com/apolloconfig/apollo/security/advisories/GHSA-c6c3-h4f7-3962"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43397"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apolloconfig/apollo","events":[{"introduced":"0"},{"fixed":"c28eb49ac0f2bf5cb0f68fd3deccd192709f996f"}]}],"versions":["0.6.2","v0.10.0","v0.10.1","v0.10.2","v0.11.0","v0.4.0","v0.5.0","v0.6.0","v0.6.3","v0.7.0","v0.8.0","v0.9.0","v0.9.1","v1.0.0","v1.1.0","v1.1.1","v1.2.0","v1.3.0","v1.4.0","v1.5.0","v1.6.0","v1.7.0","v1.8.0","v1.9.0","v2.0.0","v2.0.0-RC1","v2.0.1","v2.1.0","v2.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43397.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}]}