cvelist/2024/11xxx/CVE-2024-11311.json

117 lines
3.7 KiB
JSON
Raw Normal View History

2024-11-18 02:00:32 +00:00
{
2024-11-18 07:00:32 +00:00
"data_version": "4.0",
2024-11-18 02:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-11311",
2024-11-18 07:00:32 +00:00
"ASSIGNER": "cve@cert.org.tw",
"STATE": "PUBLIC"
2024-11-18 02:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-18 07:00:32 +00:00
"value": "The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-23 Relative Path Traversal",
"cweId": "CWE-23"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"cweId": "CWE-434"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "TRCore",
"product": {
"product_data": [
{
"product_name": "DVC",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "6.0",
"version_value": "6.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-8246-d462a-1.html",
"refsource": "MISC",
"name": "https://www.twcert.org.tw/tw/cp-132-8246-d462a-1.html"
},
{
"url": "https://www.twcert.org.tw/en/cp-139-8247-83457-2.html",
"refsource": "MISC",
"name": "https://www.twcert.org.tw/en/cp-139-8247-83457-2.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "TVN-202411018",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to version 6.4 or later."
}
],
"value": "Update to version 6.4 or later."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2024-11-18 02:00:32 +00:00
}
]
}
}