This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Tolgee v3.81.1 leaks ALL config properties via `PublicConfigurationDTO`. π **Consequences**: Massive info disclosure.β¦
π‘οΈ **Root Cause**: CWE-200 (Information Exposure). The flaw is in the API layer where sensitive configuration attributes are mistakenly included in the public-facing DTO object without filtering. π
Q3Who is affected? (Versions/Components)
π― **Affected**: **Tolgee Platform** specifically version **3.81.1**. π¦ If you are running this open-source localization platform, you are in the danger zone. Check your version immediately!
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: π΅οΈββοΈ Full read access to sensitive configs. This includes secrets, keys, and internal URLs.β¦
π **Exploitation Threshold**: **LOW**. CVSS indicates `PR:N` (No Privileges Required) and `UI:N` (No User Interaction). π Any unauthenticated user on the network can query the endpoint and dump the config.β¦
π **Self-Check**: 1. Identify if you run Tolgee v3.81.1. π΅οΈ 2. Inspect API responses for `PublicConfigurationDTO`. π 3. Look for unexpected keys (like DB passwords, API keys) in the JSON payload.β¦
β **Official Fix**: **Yes**. References point to GitHub PRs #2481 and #2689, and GHSA advisory. π The vendor has acknowledged the issue and provided patches. Update to the latest version immediately! π
Q9What if no patch? (Workaround)
π **No Patch Workaround**: If you cannot update, restrict network access to the Tolgee API. π§ Use a WAF to block requests to the configuration endpoint. π Isolate the service. This is a temporary shield, not a cure! π‘οΈ
Q10Is it urgent? (Priority Suggestion)
β‘ **Urgency**: **HIGH**. CVSS Score is High (likely 9.0+ based on vector). π No auth required. π Patch immediately. This is a critical information leak that can lead to further compromise. Don't wait! β³