"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-12-26 14:00:55 +00:00
parent e7963b983d
commit a3f4e361fe
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
2 changed files with 246 additions and 8 deletions

View File

@ -1,17 +1,149 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-12952",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical was found in melMass comfy_mtb up to 0.1.4. Affected by this vulnerability is the function run_command of the file comfy_mtb/endpoint.py of the component Dependency Handler. The manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named d6e004cce2c32f8e48b868e66b89f82da4887dc3. It is recommended to apply a patch to fix this issue."
},
{
"lang": "deu",
"value": "In melMass comfy_mtb bis 0.1.4 wurde eine kritische Schwachstelle entdeckt. Es geht um die Funktion run_command der Datei comfy_mtb/endpoint.py der Komponente Dependency Handler. Durch Manipulation mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als d6e004cce2c32f8e48b868e66b89f82da4887dc3 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Code Injection",
"cweId": "CWE-94"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Injection",
"cweId": "CWE-74"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "melMass",
"product": {
"product_data": [
{
"product_name": "comfy_mtb",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "0.1.0"
},
{
"version_affected": "=",
"version_value": "0.1.1"
},
{
"version_affected": "=",
"version_value": "0.1.2"
},
{
"version_affected": "=",
"version_value": "0.1.3"
},
{
"version_affected": "=",
"version_value": "0.1.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.289315",
"refsource": "MISC",
"name": "https://vuldb.com/?id.289315"
},
{
"url": "https://vuldb.com/?ctiid.289315",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.289315"
},
{
"url": "https://vuldb.com/?submit.468683",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.468683"
},
{
"url": "https://github.com/melMass/comfy_mtb/issues/224",
"refsource": "MISC",
"name": "https://github.com/melMass/comfy_mtb/issues/224"
},
{
"url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2553432365",
"refsource": "MISC",
"name": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2553432365"
},
{
"url": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2552664778",
"refsource": "MISC",
"name": "https://github.com/melMass/comfy_mtb/issues/224#issuecomment-2552664778"
},
{
"url": "https://github.com/melMass/comfy_mtb/commit/d6e004cce2c32f8e48b868e66b89f82da4887dc3",
"refsource": "MISC",
"name": "https://github.com/melMass/comfy_mtb/commit/d6e004cce2c32f8e48b868e66b89f82da4887dc3"
}
]
},
"credits": [
{
"lang": "en",
"value": "W8AY (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,123 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-12953",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected by this issue is some unknown functionality of the file /update_pd_process.php. The manipulation of the argument profile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in 1000 Projects Portfolio Management System MCA 1.0 entdeckt. Es geht hierbei um eine nicht n\u00e4her spezifizierte Funktion der Datei /update_pd_process.php. Mittels dem Manipulieren des Arguments profile mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unrestricted Upload",
"cweId": "CWE-434"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Improper Access Controls",
"cweId": "CWE-284"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "1000 Projects",
"product": {
"product_data": [
{
"product_name": "Portfolio Management System MCA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.289316",
"refsource": "MISC",
"name": "https://vuldb.com/?id.289316"
},
{
"url": "https://vuldb.com/?ctiid.289316",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.289316"
},
{
"url": "https://vuldb.com/?submit.468769",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.468769"
},
{
"url": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md",
"refsource": "MISC",
"name": "https://github.com/dawatermelon/CVE/blob/main/Portfolio%20Management%20System%20MCA%20Project/README4.md"
},
{
"url": "https://1000projects.org/",
"refsource": "MISC",
"name": "https://1000projects.org/"
}
]
},
"credits": [
{
"lang": "en",
"value": "wangjiawei (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}