cvelist/2024/48xxx/CVE-2024-48861.json

96 lines
3.0 KiB
JSON
Raw Normal View History

2024-10-09 01:00:31 +00:00
{
2024-11-22 16:00:33 +00:00
"data_version": "4.0",
2024-10-09 01:00:31 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-48861",
2024-11-22 16:00:33 +00:00
"ASSIGNER": "security@qnap.com",
"STATE": "PUBLIC"
2024-10-09 01:00:31 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-22 16:00:33 +00:00
"value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands.\n\nWe have already fixed the vulnerability in the following versions:\nQuRouter 2.4.4.106 and later"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-77",
"cweId": "CWE-77"
},
{
"lang": "eng",
"value": "CWE-78",
"cweId": "CWE-78"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "QNAP Systems Inc.",
"product": {
"product_data": [
{
"product_name": "QuRouter",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.4.x",
"version_value": "2.4.4.106"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-44",
"refsource": "MISC",
"name": "https://www.qnap.com/en/security-advisory/qsa-24-44"
2024-10-09 01:00:31 +00:00
}
]
2024-11-22 16:00:33 +00:00
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "QSA-24-44",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "We have already fixed the vulnerability in the following versions:<br>QuRouter 2.4.4.106 and later<br>"
}
],
"value": "We have already fixed the vulnerability in the following versions:\nQuRouter 2.4.4.106 and later"
}
],
"credits": [
{
"lang": "en",
"value": "Midnight Blue / PHP Hooligans"
}
]
2024-10-09 01:00:31 +00:00
}