cvelist/2024/11xxx/CVE-2024-11481.json

94 lines
2.9 KiB
JSON
Raw Normal View History

2024-11-20 06:00:30 +00:00
{
2024-11-29 08:00:36 +00:00
"data_version": "4.0",
2024-11-20 06:00:30 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-11481",
2024-11-29 08:00:36 +00:00
"ASSIGNER": "trellixpsirt@trellix.com",
"STATE": "PUBLIC"
2024-11-20 06:00:30 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-29 08:00:36 +00:00
"value": "A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Trellix",
"product": {
"product_data": [
{
"product_name": "Trellix Enterprise Security Manager (ESM)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "11.6.12"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://thrive.trellix.com/s/article/000014058",
"refsource": "MISC",
"name": "https://thrive.trellix.com/s/article/000014058"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Rafal Gill"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
2024-11-20 06:00:30 +00:00
}
]
}
}