cvelist/2024/1xxx/CVE-2024-1604.json
2024-10-10 16:00:31 +00:00

114 lines
4.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-1604",
"ASSIGNER": "cvd@cert.pl",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper authorization in the report management and creation module of BMC Control-M branches\u00a09.0.20 and 9.0.21 allows logged-in users to read and make unauthorized changes to any reports available within the application, even without proper permissions. The attacker must know the unique identifier of the report they want to manipulate.\n\n\n\n\n\n\n\nFix for 9.0.20 branch was released in version 9.0.20.238.\u00a0Fix for 9.0.21 branch was released in version 9.0.21.201."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-639 Authorization Bypass Through User-Controlled Key",
"cweId": "CWE-639"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "BMC",
"product": {
"product_data": [
{
"product_name": "Control-M",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "9.0.20",
"version_value": "9.0.20.238"
},
{
"version_affected": "<",
"version_name": "9.0.21",
"version_value": "9.0.21.201"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert.pl/posts/2024/03/CVE-2024-1604",
"refsource": "MISC",
"name": "https://cert.pl/posts/2024/03/CVE-2024-1604"
},
{
"url": "https://cert.pl/en/posts/2024/03/CVE-2024-1604",
"refsource": "MISC",
"name": "https://cert.pl/en/posts/2024/03/CVE-2024-1604"
},
{
"url": "https://www.bmc.com/it-solutions/control-m.html",
"refsource": "MISC",
"name": "https://www.bmc.com/it-solutions/control-m.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"credits": [
{
"lang": "en",
"value": "Maksymilian Kubiak [Afine Team]"
},
{
"lang": "en",
"value": "Dawid Ma\u0142ecki [Afine Team]"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
}
]
}
}