Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/apolloconfig/apollo/security/advisories/GHSA-c6c3-h4f7-3962 | vendor advisory |
https://github.com/apolloconfig/apollo/pull/5192 | patch issue tracking |
https://github.com/apolloconfig/apollo/commit/f55b419145bf9d4f2f51dd4cd45108229e8d97ed | patch |
https://github.com/apolloconfig/apollo/releases/tag/v2.3.0 | release notes |