漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
free5gc UDR improper path validation allows unauthenticated access to Traffic Influence Subscriptions
Vulnerability Description
free5GC is an open-source implementation of the 5G core network. In versions 4.2.1 and below of the UDR service, the handler for reading Traffic Influence Subscriptions checks whether the influenceId path segment equals subs-to-notify, but does not return after sending the HTTP 404 response when validation fails. Execution continues and the subscription data is returned alongside the 404 response. An unauthenticated attacker with access to the 5G Service Based Interface can read arbitrary Traffic Influence Subscriptions, including SUPIs/IMSIs, DNNs, S-NSSAIs, and callback URIs, by supplying any value for the influenceId path segment. A patched version was not available at the time of publication.
CVSS Information
N/A
Vulnerability Type
授权机制不恰当
Vulnerability Title
free5GC 安全漏洞
Vulnerability Description
free5GC是free5GC开源的一个第 5 代 (5G) 移动核心网络的开源项目。 free5GC 4.2.1及之前版本存在安全漏洞,该漏洞源于UDR服务中读取流量影响订阅的处理程序在验证失败后未正确返回,导致继续执行并返回订阅数据,未经身份验证的攻击者可通过访问5G服务接口读取包含SUPI/IMSI等敏感信息的任意流量影响订阅。
CVSS Information
N/A
Vulnerability Type
N/A