CVE-2022-39383

KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:kubevela:*:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:kubevela:*:*:*:*:*:*:*:*

History

18 Nov 2022, 21:37

Type Values Removed Values Added
CPE cpe:2.3:a:linuxfoundation:kubevela:*:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7 - (CONFIRM) https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7 - Third Party Advisory
References (MISC) https://github.com/kubevela/kubevela/pull/5000 - (MISC) https://github.com/kubevela/kubevela/pull/5000 - Patch, Third Party Advisory
CWE CWE-918
First Time Linuxfoundation
Linuxfoundation kubevela
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

16 Nov 2022, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-16 20:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-39383

Mitre link : CVE-2022-39383

CVE.ORG link : CVE-2022-39383


JSON object : View

Products Affected

linuxfoundation

  • kubevela
CWE
CWE-918

Server-Side Request Forgery (SSRF)