CVE-2024-27097

MEDIUM

CKAN <2.9.11, <2.10.4 - Info Disclosure

Title source: llm
STIX 2.1

Description

A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.

Scores

CVSS v3 4.3
EPSS 0.0045
EPSS Percentile 63.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-532
Status published
Products (2)
okfn/ckan 2.0 - 2.9.11
pypi/ckan 0 - 2.9.11PyPI
Published Mar 13, 2024
Tracked Since Feb 18, 2026