2024-01-23 13:00:28 +00:00
{
"id" : "CVE-2024-22076" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-01-23T11:15:09.233" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:55:30.577" ,
2024-02-16 11:01:09 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-23 13:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
2024-02-22 03:00:30 +00:00
"value" : "MyQ Print Server before 8.2 patch 43 allows remote authenticated administrators to execute arbitrary code via PHP scripts that are reached through the administrative interface."
2024-01-23 13:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "MyQ Print Server anterior a 8.2 parche 43 permite la ejecuci\u00f3n remota de c\u00f3digo no autenticado."
}
] ,
2024-01-30 17:00:28 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-01-30 17:00:28 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-01-30 17:00:28 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "8.2" ,
"matchCriteriaId" : "A76077FF-885F-4369-A3A9-676BF40AD3E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "399B63D2-D03D-4993-817E-987EB3C4C23B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF19127A-8B5C-417E-93A6-6063C067C0DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch1:*:*:*:*:*:*" ,
"matchCriteriaId" : "572F90C9-2BCB-4686-8963-16311EAA8F10"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch10:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9FC6989-A24E-4604-A7B1-78F03C2875A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch11:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F8B22D7-FAE9-48D9-AABD-CCEFC7A1B1BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch12:*:*:*:*:*:*" ,
"matchCriteriaId" : "AECEE4B2-7588-49F6-A03D-6EF8F8B8322B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch13:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C741558-8BC5-4B67-ADDA-0C2640500AAD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch14:*:*:*:*:*:*" ,
"matchCriteriaId" : "F30D7741-FAFA-437B-B369-565F99953148"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch15:*:*:*:*:*:*" ,
"matchCriteriaId" : "91F6A7BA-B67A-4CDB-AFFC-EB272B857B1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch16:*:*:*:*:*:*" ,
"matchCriteriaId" : "FAAB6A86-8616-4AC3-AFB9-4DB6D9558CDF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch17:*:*:*:*:*:*" ,
"matchCriteriaId" : "2608A1FB-1893-4478-9BD7-14078C49E36B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch18:*:*:*:*:*:*" ,
"matchCriteriaId" : "55469CAD-1FAB-4976-B00B-C6A879A098C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch19:*:*:*:*:*:*" ,
"matchCriteriaId" : "8423002A-56A3-406C-AAE0-8BD4641495DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch2:*:*:*:*:*:*" ,
"matchCriteriaId" : "8376A93E-4FD6-49ED-B975-F61E33ED6D65"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch20:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD098A09-42D7-4C5C-8560-DC305676B8EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch21:*:*:*:*:*:*" ,
"matchCriteriaId" : "BE70255C-4EEE-4ED1-8DC5-F03C595E2D63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch22:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3ACE651-EB1E-4A5D-A8E7-C9729D18AB29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch23:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DB70760-D06B-4A9A-82DA-D502E75560EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch24:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9FA6F33-8357-4A33-BF11-2E0F0049751A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch25:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9D4DA6E-3E77-4838-93E6-E860243F874F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch26:*:*:*:*:*:*" ,
"matchCriteriaId" : "1585DCDE-3D4D-4A77-AA20-14A66336CDF4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch27:*:*:*:*:*:*" ,
"matchCriteriaId" : "9129B5FF-65BC-423D-91B7-1241F27287EB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch28:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D8CD747-4DF0-4FB2-8AE9-768C35097921"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch29:*:*:*:*:*:*" ,
"matchCriteriaId" : "A204D0F1-7A97-48BA-B26C-3109E5EE88D4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch3:*:*:*:*:*:*" ,
"matchCriteriaId" : "2BDC8EFF-A6E1-424D-B027-14FD2A93A9A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch30:*:*:*:*:*:*" ,
"matchCriteriaId" : "3E4B85AD-D923-4304-BDB3-29241926358E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch31:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D0E6C9B-AF39-41FA-B2BA-11ACF9D2A1EB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch32:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA9DB230-A8AF-4ADD-8A1F-1450F1FD36EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch33:*:*:*:*:*:*" ,
"matchCriteriaId" : "7241F991-8D92-48B0-87B0-26F1B1ADC399"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch34:*:*:*:*:*:*" ,
"matchCriteriaId" : "FAA97809-AAFE-474B-BAF2-362210B22A2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch35:*:*:*:*:*:*" ,
"matchCriteriaId" : "77D9BCBA-C690-43AD-9C59-4D1C4B937E30"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch36:*:*:*:*:*:*" ,
"matchCriteriaId" : "4BD1D6B7-74F6-4E3F-B9BB-7A9F892DBFF8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch37:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE2A5618-ADEA-4A38-88E7-A54F0BB2FE24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch38:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEB44A1E-C8AA-444F-BA43-243265BAD542"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch39:*:*:*:*:*:*" ,
"matchCriteriaId" : "6CA97DBE-852D-4A3B-8983-9CE4FAD94942"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch4:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC5D3F81-1396-446A-901C-7938EDAA3C43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch40:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF4D66BD-CEDD-47D9-BB32-F388E8A3EDBC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch41:*:*:*:*:*:*" ,
"matchCriteriaId" : "485A1347-3BFE-4155-ACC9-D726067796E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch42:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EC0EF62-E453-4F5F-95CC-B1341EB6A3C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch5:*:*:*:*:*:*" ,
"matchCriteriaId" : "C09099F3-607B-48C1-B4BA-4A9753638CED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch6:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D985018-F163-40BC-B768-78A340EB7C28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch7:*:*:*:*:*:*" ,
"matchCriteriaId" : "48B47DD2-F64F-411B-8EB8-775419408097"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch8:*:*:*:*:*:*" ,
"matchCriteriaId" : "1AAC8A77-58BD-41FB-A032-5F597DF8EC6B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:patch9:*:*:*:*:*:*" ,
"matchCriteriaId" : "45BE1FCB-418F-44BE-8F30-F0350A7E1232"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "6DA8B157-08E1-493A-99FE-96FDFD0CA60C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BB6B4B3-DA96-4E0B-AFD2-89AF494B2ED2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:myq-solution:print_server:8.2:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "5273C99A-4126-4019-B10F-AB2876E2A8BC"
}
]
}
]
}
] ,
2024-01-23 13:00:28 +00:00
"references" : [
{
"url" : "https://docs.myq-solution.com/en/print-server/8.2/" ,
2024-01-30 17:00:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes"
]
2024-01-23 13:00:28 +00:00
} ,
{
"url" : "https://docs.myq-solution.com/en/print-server/8.2/technical-changelog#id-%288.2%29ReleaseNotes-8.2%28Patch43%29" ,
2024-01-30 17:00:28 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes"
]
2024-02-16 11:01:09 +00:00
} ,
{
"url" : "https://www.access42.nl/nieuws/unmasking-web-vulnerabilities-a-tale-of-default-admin-credentials-and-php-command-execution-cve-2024-22076/" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://docs.myq-solution.com/en/print-server/8.2/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "https://docs.myq-solution.com/en/print-server/8.2/technical-changelog#id-%288.2%29ReleaseNotes-8.2%28Patch43%29" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes"
]
} ,
{
"url" : "https://www.access42.nl/nieuws/unmasking-web-vulnerabilities-a-tale-of-default-admin-credentials-and-php-command-execution-cve-2024-22076/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-01-23 13:00:28 +00:00
}
]
}