CVE-2024-35223

5.3 MEDIUM
Published: May 23, 2024 Modified: April 15, 2026
View on NVD

Description

Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. Dapr sends the app token of the invoker app instead of the app token of the invoked app. This causes of a leak of the application token of the invoker app to the invoked app when using Dapr as a gRPC proxy for remote service invocation. This vulnerability impacts Dapr users who use Dapr as a gRPC proxy for remote service invocation as well as the Dapr App API token functionality. An attacker could exploit this vulnerability to gain access to the app token of the invoker app, potentially compromising security and authentication mechanisms. This vulnerability was patched in version 1.13.3.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/dapr/dapr/issues/7344
Source: security-advisories@github.com
https://github.com/dapr/dapr/pull/7404
Source: security-advisories@github.com
https://github.com/dapr/dapr/releases/tag/v1.13.3
Source: security-advisories@github.com
https://github.com/dapr/dapr/issues/7344
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/dapr/dapr/pull/7404
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/dapr/dapr/releases/tag/v1.13.3
Source: af854a3a-2127-422b-91ae-364da2661108

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
0.4%
63th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)