CVE-2024-23687: Hard-coded System User Credentials in Folio Data Export Spring module
(updated )
The module creates a system user that is used to perform internal module-to-module operations. Credentials for this user are hard-coded in the source code. This makes it trivial to authenticate as this user, resulting in unauthorized access to potentially dangerous APIs, allowing to view and modify configuration including single-sign-on configuration, to read, add and modify user data, and to read and transfer fees/fines in a patron’s account.
References
- github.com/advisories/GHSA-vf78-3q9f-92g3
- github.com/folio-org/mod-data-export-spring
- github.com/folio-org/mod-data-export-spring/commit/93aff4566bff59e30f4121b5a2bda5b0b508a446
- github.com/folio-org/mod-data-export-spring/commit/cb6785565067a2a90c1e2250c241e5b23214c691
- github.com/folio-org/mod-data-export-spring/security/advisories/GHSA-vf78-3q9f-92g3
- nvd.nist.gov/vuln/detail/CVE-2024-23687
- wiki.folio.org/x/hbMMBw
Code Behaviors & Features
Detect and mitigate CVE-2024-23687 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →