Total vulnerabilities in the database
Apollo is a configuration management system. A vulnerability exists in the synchronization configuration feature that allows users to craft specific requests to bypass permission checks. This exploit enables them to modify a namespace without the necessary permissions. The issue was addressed with an input parameter check which was released in version 2.3.0.
Software | From | Fixed in |
---|---|---|
![]() |
- | 2.3.0 |
apolloconfig / apollo | - | 2.3.0 |