cvelist/2024/29xxx/CVE-2024-29968.json

88 lines
2.9 KiB
JSON
Raw Normal View History

2024-04-02 14:13:38 +00:00
{
2024-04-19 06:00:32 +00:00
"data_version": "4.0",
2024-04-02 14:13:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-29968",
2024-04-19 06:00:32 +00:00
"ASSIGNER": "sirt@brocade.com",
"STATE": "PUBLIC"
2024-04-02 14:13:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-19 06:00:32 +00:00
"value": "An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"cweId": "CWE-200"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Brocade",
"product": {
"product_data": [
{
"product_name": "Brocade SANnav",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before v2.3.1 and v2.3.0a "
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23253",
"refsource": "MISC",
"name": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23253"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
2024-04-02 14:13:38 +00:00
}
]
}
}