2024-10-25 23:58:18 +00:00
{
"id" : "CVE-2024-48239" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-10-25T22:15:02.770" ,
2024-10-29 21:03:20 +00:00
"lastModified" : "2024-10-29T19:35:22.840" ,
2024-10-28 15:04:19 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-10-25 23:58:18 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "An issue was discovered in WTCMS 1.0. In the plupload method in \\AssetController.class.php, the app parameters aren't processed, resulting in Cross Site Scripting (XSS)."
2024-10-28 15:04:19 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se descubri\u00f3 un problema en WTCMS 1.0. En el m\u00e9todo plupload en \\AssetController.class.php, los par\u00e1metros de la aplicaci\u00f3n no se procesan, lo que genera un ataque de Cross Site Scripting (XSS)."
2024-10-25 23:58:18 +00:00
}
] ,
2024-10-29 21:03:20 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
}
]
} ,
"weaknesses" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2024-10-25 23:58:18 +00:00
"references" : [
{
"url" : "https://github.com/taosir/wtcms/issues/16" ,
"source" : "cve@mitre.org"
}
]
}