Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-38495", "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "state": "PUBLISHED", "assignerShortName": "GitHub_M", "dateReserved": "2023-07-18T16:28:12.076Z", "datePublished": "2023-07-27T18:07:13.283Z", "dateUpdated": "2024-10-10T18:00:40.652Z"}, "containers": {"cna": {"title": "Crossplane vulnerable to possible image tampering from missing image validation for Packages", "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "lang": "en", "description": "CWE-20: Improper Input Validation", "type": "CWE"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1"}}], "references": [{"name": "https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m", "tags": ["x_refsource_CONFIRM"], "url": "https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m"}, {"name": "https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf", "tags": ["x_refsource_MISC"], "url": "https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf"}], "affected": [{"vendor": "crossplane", "product": "crossplane", "versions": [{"version": "< 1.11.5", "status": "affected"}, {"version": ">= 1.12.0, < 1.12.3", "status": "affected"}]}], "providerMetadata": {"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M", "dateUpdated": "2023-07-27T18:07:13.283Z"}, "descriptions": [{"lang": "en", "value": "Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, Crossplane's image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0. As a workaround, only use images from trusted sources and keep Package editing/creating privileges to administrators only."}], "source": {"advisory": "GHSA-pj4x-2xr5-w87m", "discovery": "UNKNOWN"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T17:46:55.228Z"}, "title": "CVE Program Container", "references": [{"name": "https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m", "tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/crossplane/crossplane/security/advisories/GHSA-pj4x-2xr5-w87m"}, {"name": "https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf", "tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf"}]}, {"affected": [{"vendor": "crossplane", "product": "crossplane", "cpes": ["cpe:2.3:a:crossplane:crossplane:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "1.11.5", "versionType": "custom"}, {"version": "1.12.0", "status": "affected", "lessThan": "1.12.3", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-10T17:55:58.170836Z", "id": "CVE-2023-38495", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-10T18:00:40.652Z"}}]}}