Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 07 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonarsource
Sonarsource sonarqube |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sonarsource
Sonarsource sonarqube |
|
| Metrics |
cvssV3_1
|
Fri, 04 Oct 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in SonarSource SonarQube before 9.9.5 LTA and 10.x before 10.5. A SonarQube user with the Administrator role can modify an existing configuration of a GitHub integration to exfiltrate a pre-signed JWT. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-04T22:16:52.055Z
Reserved: 2024-10-04T00:00:00.000Z
Link: CVE-2024-47910
Updated: 2024-10-04T21:44:04.815Z
Status : Deferred
Published: 2024-10-04T21:15:13.453
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-47910
No data.
OpenCVE Enrichment
No data.