You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/labring/sealos
versions:
- {}
vulnerable_at: 1.14.0
packages:
- package: github.com/labring/sealos
summary: Sealos billing system permission control defect
description: |-
### Summary
There is a permission flaw in the Sealos billing system, which allows users to
control the recharge resource account. sealos. io/v1/Payment, resulting in the
ability to recharge any amount of 1 RMB.
### Details
The reason is that sealos is in arrears. Egg pain, we can't create a terminal
anymore. Let's charge for it:
Then it was discovered that the charging interface had returned all resource
information. Unfortunately, based on previous vulnerability experience, the
namespace of this custom resource is still under the current user's control and
may have permission to correct it.
### PoC disable by publish
### Impact
+ sealos public cloud user
+ CWE-287 Improper Authentication
ghsas:
- GHSA-vpxf-q44g-w34w
references:
- advisory: https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w
- advisory: https://github.com/advisories/GHSA-vpxf-q44g-w34w
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-vpxf-q44g-w34w, there is a vulnerability in the following Go packages or modules:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: