mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
110 lines
4.3 KiB
JSON
110 lines
4.3 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-5241",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability was found in Huashi Private Cloud CDN Live Streaming Acceleration Server up to 20240520. It has been classified as critical. Affected is an unknown function of the file /manager/ipconfig_new.php. The manipulation of the argument dev leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265992."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "Es wurde eine kritische Schwachstelle in Huashi Private Cloud CDN Live Streaming Acceleration Server bis 20240520 ausgemacht. Es geht dabei um eine nicht klar definierte Funktion der Datei /manager/ipconfig_new.php. Dank Manipulation des Arguments dev mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-78 OS Command Injection",
|
|
"cweId": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Huashi",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Private Cloud CDN Live Streaming Acceleration Server",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "20240520"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.265992",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.265992"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.265992",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.265992"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?submit.339491",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?submit.339491"
|
|
},
|
|
{
|
|
"url": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/8I~%2CbRx%5E4%26%3Fu%7D2tS/Huashi_Private_Cloud_CDN_Live_Streaming_Acceleration_Server_RCE_Vulnerability-ipconfig_new.php.pdf",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/8I~%2CbRx%5E4%26%3Fu%7D2tS/Huashi_Private_Cloud_CDN_Live_Streaming_Acceleration_Server_RCE_Vulnerability-ipconfig_new.php.pdf"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "H0e4a0r1t (VulDB User)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 4.7,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 4.7,
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 5.8,
|
|
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P"
|
|
}
|
|
]
|
|
}
|
|
} |