cvelist/2024/21xxx/CVE-2024-21893.json

96 lines
3.6 KiB
JSON
Raw Normal View History

2024-01-03 02:00:38 +00:00
{
2024-01-31 18:00:33 +00:00
"data_version": "4.0",
2024-01-03 02:00:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-21893",
2024-01-31 18:00:33 +00:00
"ASSIGNER": "support@hackerone.com",
"STATE": "PUBLIC"
2024-01-03 02:00:38 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-01-31 18:00:33 +00:00
"value": "A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Ivanti",
"product": {
"product_data": [
{
"product_name": "ICS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "9.1R18",
"version_value": "9.1R18"
},
{
"version_affected": "<=",
"version_name": "22.6R2",
"version_value": "22.6R2"
}
]
}
},
{
"product_name": "IPS",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "9.1R18",
"version_value": "9.1R18"
},
{
"version_affected": "<=",
"version_name": "22.6R1",
"version_value": "22.6R1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US",
"refsource": "MISC",
"name": "https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US"
}
]
},
"impact": {
"cvss": [
{
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH"
2024-01-03 02:00:38 +00:00
}
]
}
}