FKIE_CVE-2024-32973
Vulnerability from fkie_nvd - Published: 2024-05-01 11:15 - Updated: 2024-11-21 09:16
Severity ?
Summary
Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. In affected versions an attacker with the ability to actively intercept network traffic would be able to use a specifically-crafted certificate to fool Pluto into trusting it to be the intended remote for the TLS session. This results in the HTTP library and socket.starttls providing less transport integrity than expected. This issue has been patched in pull request #851 which has been included in version 0.9.3. Users are advised to upgrade. there are no known workarounds for this vulnerability.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. In affected versions an attacker with the ability to actively intercept network traffic would be able to use a specifically-crafted certificate to fool Pluto into trusting it to be the intended remote for the TLS session. This results in the HTTP library and socket.starttls providing less transport integrity than expected. This issue has been patched in pull request #851 which has been included in version 0.9.3. Users are advised to upgrade. there are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Pluto es un superconjunto de Lua 5.4 centrado en la programaci\u00f3n de prop\u00f3sito general. En las versiones afectadas, un atacante con la capacidad de interceptar activamente el tr\u00e1fico de red podr\u00eda utilizar un certificado manipulado espec\u00edficamente para enga\u00f1ar a Pluto y hacerle confiar en que es el control remoto previsto para la sesi\u00f3n TLS. Esto da como resultado que la librer\u00eda HTTP y socket.starttls proporcionen menos integridad de transporte de lo esperado. Este problema se solucion\u00f3 en la solicitud de extracci\u00f3n n.\u00b0 851, que se incluy\u00f3 en la versi\u00f3n 0.9.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"id": "CVE-2024-32973",
"lastModified": "2024-11-21T09:16:08.583",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-05-01T11:15:46.200",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/PlutoLang/Pluto/pull/851"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/PlutoLang/Pluto/security/advisories/GHSA-84hj-7j2v-w665"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/PlutoLang/Pluto/pull/851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/PlutoLang/Pluto/security/advisories/GHSA-84hj-7j2v-w665"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…