First published: Thu Oct 10 2024(Updated: )
The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.
Credit: zowe-security@lists.openmainframeproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Zowe Api Mediation Layer | >=1.0.0<1.28.8 | |
Linuxfoundation Zowe Api Mediation Layer | >=2.0.0<2.18.0 |
In version 2.18.0 set configuration property `apiml.health.protected` to `true` to require authentication or upgrade to version 3.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-9798 is categorized as high due to the exposure of the health endpoint, which can reveal sensitive service information.
To fix CVE-2024-9798, restrict access to the health endpoint to authorized users only or apply any applicable security patches provided by the software vendor.
CVE-2024-9798 affects versions of Zowe API Mediation Layer from 1.0.0 to 1.28.8 and from 2.0.0 to 2.18.0.
The impact of CVE-2024-9798 is that it allows attackers to enumerate services available, which may lead to further exploitation.
As of now, there is no known public exploit for CVE-2024-9798, but the vulnerability itself poses a risk due to unnecessary exposure.