CVE-2024-23685: Hard-coded System User Credentials in Folio Data Export Spring module
(updated )
The module creates a system user that is used to perform internal module-to-module operations. Credentials for this user are hard-coded in the source code. This makes it trivial to authenticate as this user, allowing unauthorized read access to these mod-inventory-storage records: instances, holdings, items, contributor-types, identifier-types. This includes records marked as suppressed from discovery.
References
- github.com/advisories/GHSA-m8v7-469p-5x89
- github.com/folio-org/mod-remote-storage
- github.com/folio-org/mod-remote-storage/commit/57df495f76e9aa5be9ce7ce3a65f89b6dbcbc13b
- github.com/folio-org/mod-remote-storage/security/advisories/GHSA-m8v7-469p-5x89
- nvd.nist.gov/vuln/detail/CVE-2024-23685
- vulncheck.com/advisories/vc-advisory-GHSA-m8v7-469p-5x89
- wiki.folio.org/x/hbMMBw
Code Behaviors & Features
Detect and mitigate CVE-2024-23685 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →