cvelist/2024/4xxx/CVE-2024-4142.json

89 lines
2.9 KiB
JSON
Raw Normal View History

2024-04-24 19:00:35 +00:00
{
2024-05-01 21:01:08 +00:00
"data_version": "4.0",
2024-04-24 19:00:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4142",
2024-05-01 21:01:08 +00:00
"ASSIGNER": "security@jfrog.com",
"STATE": "PUBLIC"
2024-04-24 19:00:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-05-01 21:01:08 +00:00
"value": "An Improper input validation vulnerability that could potentially lead to privilege escalation\u00a0was discovered in JFrog Artifactory.\n\nDue to this vulnerability, users with low privileges may gain administrative access to the system.\n\nThis issue can also be exploited in Artifactory platforms with anonymous access enabled.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "JFrog",
"product": {
"product_data": [
{
"product_name": "Artifactory",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "7.84.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"refsource": "MISC",
"name": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
2024-04-24 19:00:35 +00:00
}
]
}
}