fkie_cve-2024-32973
Vulnerability from fkie_nvd
Published
2024-05-01 11:15
Modified
2024-11-21 09:16
Severity ?
Summary
Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. In affected versions an attacker with the ability to actively intercept network traffic would be able to use a specifically-crafted certificate to fool Pluto into trusting it to be the intended remote for the TLS session. This results in the HTTP library and socket.starttls providing less transport integrity than expected. This issue has been patched in pull request #851 which has been included in version 0.9.3. Users are advised to upgrade. there are no known workarounds for this vulnerability.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pluto is a superset of Lua 5.4 with a focus on general-purpose programming. In affected versions an attacker with the ability to actively intercept network traffic would be able to use a specifically-crafted certificate to fool Pluto into trusting it to be the intended remote for the TLS session. This results in the HTTP library and socket.starttls providing less transport integrity than expected. This issue has been patched in pull request #851 which has been included in version 0.9.3. Users are advised to upgrade. there are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Pluto es un superconjunto de Lua 5.4 centrado en la programaci\u00f3n de prop\u00f3sito general. En las versiones afectadas, un atacante con la capacidad de interceptar activamente el tr\u00e1fico de red podr\u00eda utilizar un certificado manipulado espec\u00edficamente para enga\u00f1ar a Pluto y hacerle confiar en que es el control remoto previsto para la sesi\u00f3n TLS. Esto da como resultado que la librer\u00eda HTTP y socket.starttls proporcionen menos integridad de transporte de lo esperado. Este problema se solucion\u00f3 en la solicitud de extracci\u00f3n n.\u00b0 851, que se incluy\u00f3 en la versi\u00f3n 0.9.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"id": "CVE-2024-32973",
"lastModified": "2024-11-21T09:16:08.583",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-05-01T11:15:46.200",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/PlutoLang/Pluto/pull/851"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/PlutoLang/Pluto/security/advisories/GHSA-84hj-7j2v-w665"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/PlutoLang/Pluto/pull/851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/PlutoLang/Pluto/security/advisories/GHSA-84hj-7j2v-w665"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…