2024-07-12 18:03:13 +00:00
{
"id" : "CVE-2024-40518" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-07-12T16:15:04.850" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T09:31:14.500" ,
2024-08-01 14:03:18 +00:00
"vulnStatus" : "Modified" ,
2024-07-12 18:03:13 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "SeaCMS 12.9 has a remote code execution vulnerability. The vulnerability is caused by admin_weixin.php directly splicing and writing the user input data into weixin.php without processing it, which allows authenticated attackers to exploit the vulnerability to execute arbitrary commands and obtain system permissions."
2024-07-21 02:03:14 +00:00
} ,
{
"lang" : "es" ,
"value" : "SeaCMS 12.9 tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. La vulnerabilidad es causada porque admin_weixin.php empalma y escribe directamente los datos de entrada del usuario en weixin.php sin procesarlos, lo que permite a atacantes autenticados explotar la vulnerabilidad para ejecutar comandos arbitrarios y obtener permisos del sistema."
2024-07-12 18:03:13 +00:00
}
] ,
2024-07-12 20:03:12 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-07-12 20:03:12 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-07-12 20:03:12 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2024-08-01 14:03:18 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
2024-08-01 14:03:18 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-08-01 14:03:18 +00:00
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
2024-07-12 20:03:12 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
2024-08-01 14:03:18 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-20"
}
]
2024-07-12 20:03:12 +00:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
}
]
}
]
}
] ,
2024-07-12 18:03:13 +00:00
"references" : [
{
"url" : "https://gitee.com/fushuling/cve/blob/master/SeaCMS%2012.9%20admin_weixin.php%20code%20injection.md" ,
2024-07-12 20:03:12 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://gitee.com/fushuling/cve/blob/master/SeaCMS%2012.9%20admin_weixin.php%20code%20injection.md" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
2024-07-12 18:03:13 +00:00
}
]
}