THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-5732

Clash Proxy Port improper authentication

AssignerVulDB
Reserved2024-06-07
Published2024-06-07
Updated2024-06-07

Description

EN DE

A vulnerability was found in Clash up to 0.20.1 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Proxy Port. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-267406 is the identifier assigned to this vulnerability.

In Clash bis 0.20.1 für Windows wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität der Komponente Proxy Port. Durch das Manipulieren mit unbekannten Daten kann eine improper authentication-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme werden Anpassungen an der Konfiguration empfohlen.



MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P

Problem types

CWE-287 Improper Authentication

Timeline

2024-06-07:Advisory disclosed
2024-06-07:VulDB entry created
2024-06-07:VulDB entry last update

Credits

rollingchair (VulDB User) reporter

References

https://vuldb.com/?id.267406 (VDB-267406 | Clash Proxy Port improper authentication) vdb-entry

https://vuldb.com/?ctiid.267406 (VDB-267406 | CTI Indicators (IOB, IOC)) signature permissions-required

https://vuldb.com/?submit.345469 (Submit #345469 | clash for windows 0.10-0.0.20.1 Unverified Ownership) third-party-advisory

https://github.com/GTA12138/vul/blob/main/clash%20for%20windows.md exploit

cve.org CVE-2024-5732

nvd.nist.gov CVE-2024-5732

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5732
© Copyright 2024 THREATINT. Made in Cyprus with +