CVE-2024-23639

Micronaut Framework is a modern, JVM-based, full stack Java framework designed for building modular, easily testable JVM applications with support for Java, Kotlin and the Groovy language. Enabled but unsecured management endpoints are susceptible to drive-by localhost attacks. While not typical of a production application, these attacks may have more impact on a development environment where such endpoints may be flipped on without much thought. A malicious/compromised website can make HTTP requests to `localhost`. Normally, such requests would trigger a CORS preflight check which would prevent the request; however, some requests are "simple" and do not require a preflight check. These endpoints, if enabled and not secured, are vulnerable to being triggered. Production environments typically disable unused endpoints and secure/restrict access to needed endpoints. A more likely victim is the developer in their local development host, who has enabled endpoints without security for the sake of easing development. This issue has been addressed in version 3.8.3. Users are advised to upgrade.
Configurations

Configuration 1 (hide)

cpe:2.3:a:objectcomputing:micronaut:*:*:*:*:*:*:*:*

History

16 Feb 2024, 13:53

Type Values Removed Values Added
First Time Objectcomputing
Objectcomputing micronaut
References () https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests - () https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests - Not Applicable
References () https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-583g-g682-crxf - () https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-583g-g682-crxf - Third Party Advisory
Summary
  • (es) Micronaut Framework es un framework Java moderno, de pila completa y basado en JVM, manipulado para crear aplicaciones JVM modulares y fácilmente comprobables con soporte para Java, Kotlin y el lenguaje Groovy. Los endpoints de administración habilitados pero no seguros son susceptibles a ataques de host local. Si bien no son típicos de una aplicación de producción, estos ataques pueden tener un mayor impacto en un entorno de desarrollo donde dichos endpoints pueden activarse sin pensarlo mucho. Un sitio web malicioso o comprometido puede realizar solicitudes HTTP a "localhost". Normalmente, dichas solicitudes desencadenarían una verificación previa de CORS que impediría la solicitud; sin embargo, algunas solicitudes son "simples" y no requieren una verificación previa. Estos endpoints, si están habilitados y no protegidos, son vulnerables a ser activados. Los entornos de producción normalmente desactivan los endpoints no utilizados y protegen/restringen el acceso a los endpoints necesarios. Una víctima más probable es el desarrollador de su host de desarrollo local, que ha habilitado endpoints sin seguridad para facilitar el desarrollo. Este problema se solucionó en la versión 3.8.3. Se recomienda a los usuarios que actualicen.
CPE cpe:2.3:a:objectcomputing:micronaut:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.1
v2 : unknown
v3 : 7.8

09 Feb 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 01:15

Updated : 2024-02-16 13:53


NVD link : CVE-2024-23639

Mitre link : CVE-2024-23639

CVE.ORG link : CVE-2024-23639


JSON object : View

Products Affected

objectcomputing

  • micronaut
CWE
CWE-15

External Control of System or Configuration Setting

CWE-610

Externally Controlled Reference to a Resource in Another Sphere

CWE-664

Improper Control of a Resource Through its Lifetime