2024-08-14 18:03:14 +00:00
{
"id" : "CVE-2024-5914" ,
"sourceIdentifier" : "psirt@paloaltonetworks.com" ,
"published" : "2024-08-14T17:15:18.220" ,
2024-08-20 18:03:14 +00:00
"lastModified" : "2024-08-20T16:22:06.357" ,
"vulnStatus" : "Analyzed" ,
2024-08-14 18:03:14 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A command injection issue in Palo Alto Networks Cortex XSOAR CommonScripts Pack allows an unauthenticated attacker to execute arbitrary commands within the context of an integration container."
2024-08-18 02:03:12 +00:00
} ,
{
"lang" : "es" ,
"value" : " Un problema de inyecci\u00f3n de comandos en Palo Alto Networks Cortex XSOAR CommonScripts Pack permite que un atacante no autenticado ejecute comandos arbitrarios dentro del contexto de un contenedor de integraci\u00f3n."
2024-08-14 18:03:14 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "psirt@paloaltonetworks.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"attackRequirements" : "PRESENT" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"vulnerableSystemConfidentiality" : "LOW" ,
"vulnerableSystemIntegrity" : "LOW" ,
"vulnerableSystemAvailability" : "LOW" ,
"subsequentSystemConfidentiality" : "HIGH" ,
"subsequentSystemIntegrity" : "HIGH" ,
"subsequentSystemAvailability" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirements" : "NOT_DEFINED" ,
"integrityRequirements" : "NOT_DEFINED" ,
"availabilityRequirements" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnerableSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedVulnerableSystemIntegrity" : "NOT_DEFINED" ,
"modifiedVulnerableSystemAvailability" : "NOT_DEFINED" ,
"modifiedSubsequentSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedSubsequentSystemIntegrity" : "NOT_DEFINED" ,
"modifiedSubsequentSystemAvailability" : "NOT_DEFINED" ,
"safety" : "NOT_DEFINED" ,
"automatable" : "NO" ,
"recovery" : "USER" ,
"valueDensity" : "DIFFUSE" ,
"vulnerabilityResponseEffort" : "MODERATE" ,
"providerUrgency" : "AMBER" ,
"baseScore" : 7.0 ,
"baseSeverity" : "HIGH"
}
}
2024-08-20 18:03:14 +00:00
] ,
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
2024-08-14 18:03:14 +00:00
]
} ,
"weaknesses" : [
2024-08-20 18:03:14 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
} ,
2024-08-14 18:03:14 +00:00
{
"source" : "psirt@paloaltonetworks.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
}
] ,
2024-08-20 18:03:14 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:paloaltonetworks:cortex_xsoar_commonscripts:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.12.33" ,
"matchCriteriaId" : "035D09D6-8E59-4889-AAE9-35CE4B8C4B4C"
}
]
}
]
}
] ,
2024-08-14 18:03:14 +00:00
"references" : [
{
"url" : "https://security.paloaltonetworks.com/CVE-2024-5914" ,
2024-08-20 18:03:14 +00:00
"source" : "psirt@paloaltonetworks.com" ,
"tags" : [
"Vendor Advisory"
]
2024-08-14 18:03:14 +00:00
}
]
}