CVE-2022-1561

Lura and KrakenD-CE versions older than v2.0.2 and KrakenD-EE versions older than v2.0.0 do not sanitize URL parameters correctly, allowing a malicious user to alter the backend URL defined for a pipe when remote users send crafty URL requests. The vulnerability does not affect KrakenD itself, but the consumed backend might be vulnerable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:krakend:krakend:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:krakend:krakend:*:*:*:*:community:*:*:*
cpe:2.3:a:luraproject:lura:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:40

Type Values Removed Values Added
References () https://www.incibe-cert.es/en/early-warning/security-advisories/crafted-backend-urls-lura-project - Third Party Advisory () https://www.incibe-cert.es/en/early-warning/security-advisories/crafted-backend-urls-lura-project - Third Party Advisory
References () https://www.krakend.io/blog/cve-2022-1561-crafted-backend-urls/ - Vendor Advisory () https://www.krakend.io/blog/cve-2022-1561-crafted-backend-urls/ - Vendor Advisory
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : 4.0

Information

Published : 2022-08-01 13:15

Updated : 2024-11-21 06:40


NVD link : CVE-2022-1561

Mitre link : CVE-2022-1561

CVE.ORG link : CVE-2022-1561


JSON object : View

Products Affected

krakend

  • krakend

luraproject

  • lura
CWE
CWE-471

Modification of Assumed-Immutable Data (MAID)

NVD-CWE-Other