2024-05-27 08:03:30 +00:00
{
"id" : "CVE-2024-5400" ,
"sourceIdentifier" : "twcert@cert.org.tw" ,
"published" : "2024-05-27T06:15:10.620" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T09:47:34.830" ,
2024-05-28 14:03:31 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-27 08:03:30 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Openfind Mail2000 does not properly filter parameters of specific CGI. Remote attackers with regular privileges can exploit this vulnerability to execute arbitrary system commands on the remote server."
2024-05-28 14:03:31 +00:00
} ,
{
"lang" : "es" ,
"value" : "Openfind Mail2000 no filtra adecuadamente los par\u00e1metros de CGI espec\u00edficos. Los atacantes remotos con privilegios regulares pueden aprovechar esta vulnerabilidad para ejecutar comandos arbitrarios del sistema en el servidor remoto."
2024-05-27 08:03:30 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "twcert@cert.org.tw" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-05-27 08:03:30 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-05-27 08:03:30 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-05-27 08:03:30 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "twcert@cert.org.tw" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-05-27 08:03:30 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
"references" : [
{
"url" : "https://www.twcert.org.tw/tw/cp-132-7819-9661a-1.html" ,
"source" : "twcert@cert.org.tw"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.twcert.org.tw/tw/cp-132-7819-9661a-1.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-05-27 08:03:30 +00:00
}
]
}