CVE-2024-39314

toy-blog is a headless content management system implementation. Starting in version 0.4.3 and prior to version 0.5.0, the administrative password was leaked through the command line parameter. The problem was patched in version 0.5.0. As a workaround, pass `--read-bearer-token-from-stdin` to the launch arguments and feed the token from the standard input in version 0.4.14 or later. Earlier versions do not have this workaround.
Configurations

No configuration.

History

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://github.com/KisaragiEffective/toy-blog/commit/4d003e46a944d8f44ea02c63f4beefa4cbe1f4f7 - () https://github.com/KisaragiEffective/toy-blog/commit/4d003e46a944d8f44ea02c63f4beefa4cbe1f4f7 -
References () https://github.com/KisaragiEffective/toy-blog/security/advisories/GHSA-q8g2-c3x5-gp89 - () https://github.com/KisaragiEffective/toy-blog/security/advisories/GHSA-q8g2-c3x5-gp89 -

02 Jul 2024, 12:09

Type Values Removed Values Added
Summary
  • (es) toy-blog es una implementación de sistema de gestión de contenidos sin headless. A partir de la versión 0.4.3 y antes de la versión 0.5.0, la contraseña administrativa se filtró a través del parámetro de línea de comando. El problema se solucionó en la versión 0.5.0. Como workaround, pase `--read-bearer-token-from-stdin` a los argumentos de inicio y proporcione el token desde la entrada estándar en la versión 0.4.14 o posterior. Las versiones anteriores no tienen este workaround.

01 Jul 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-01 22:15

Updated : 2024-11-21 09:27


NVD link : CVE-2024-39314

Mitre link : CVE-2024-39314

CVE.ORG link : CVE-2024-39314


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-214

Invocation of Process Using Visible Sensitive Information