Ktor HttpCache Improper Caching Info Disclosure, before 2.3.13
CVE-2024-49580 Published on October 17, 2024

In JetBrains Ktor before 2.3.13 improper caching in HttpCache Plugin could lead to response information disclosure

NVD

Vulnerability Analysis

CVE-2024-49580 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Use of Cache Containing Sensitive Information

The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere. Applications may use caches to improve efficiency when communicating with remote entities or performing intensive calculations. A cache maintains a pool of objects, threads, connections, pages, financial data, passwords, or other resources to minimize the time it takes to initialize and access these resources. If the cache is accessible to unauthorized actors, attackers can read the cache and obtain this sensitive information.


Products Associated with CVE-2024-49580

Want to know whenever a new CVE is published for JetBrains Ktor? stack.watch will email you.

 

Affected Versions

JetBrains Ktor: jetbrains ktor:

Exploit Probability

EPSS
0.01%
Percentile
0.53%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.