CVE-2024-47910
CVE-2024-47910: SonarQube Administrator JWT Exfiltration. A vulnerability exists in SonarSource SonarQube before versions 9.9.5 LTA and 10.x before 10.5, allowing an administrator to modify GitHub integration configurations and exfiltrate a pre-signed JWT. The SVRS score of 30 suggests a moderate risk, although lower than critical, it should still be addressed. Although the CVSS score is 0, the presence of this exploit 'In The Wild' tag indicates active exploitation attempts, elevating the risk. An attacker could use the exfiltrated JWT to gain unauthorized access to resources and sensitive information managed by SonarQube. Applying the patch is crucial to prevent potential data breaches and maintain the security of your SonarQube instance. Failing to address this could lead to significant security compromises.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.