CVE-2024-36264: Apache Submarine Commons Utils has a hard-coded secret
(updated )
Improper Authentication vulnerability in Apache Submarine Commons Utils.
This issue affects Apache Submarine Commons Utils: from 0.8.0.
As this project is retired, we do not plan to release a version that fixes this issue. If the user doesn’t explicitly set submarine.auth.default.secret
, a default value will be used. Users are recommended to find an alternative or restrict access to the instance to trusted users.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
- github.com/advisories/GHSA-jwcg-wv5x-vg3g
- github.com/apache/submarine
- github.com/apache/submarine/commit/7a1d551798c6785fc68fe028fc46f74c3ee6976d
- github.com/apache/submarine/pull/1125
- github.com/pypa/advisory-database/tree/main/vulns/apache-submarine/PYSEC-2024-97.yaml
- issues.apache.org/jira/browse/SUBMARINE-1417
- lists.apache.org/thread/7mo0c7vbhpo8thvybl8wwvb0bccrg7r4
- nvd.nist.gov/vuln/detail/CVE-2024-36264
Detect and mitigate CVE-2024-36264 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →