mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
96 lines
2.6 KiB
JSON
96 lines
2.6 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-24834",
|
||
|
"sourceIdentifier": "twcert@cert.org.tw",
|
||
|
"published": "2023-03-27T04:15:09.660",
|
||
|
"lastModified": "2023-04-18T13:32:37.937",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "WisdomGarden Tronclass has improper access control when uploading file. An authenticated remote attacker with general user privilege can exploit this vulnerability to access files belonging to other users by modifying the file ID within URL."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "twcert@cert.org.tw",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 6.5,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 2.8,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-639"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"source": "twcert@cert.org.tw",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-639"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wisdomgarden:tronclass_ilearn:*:*:*:*:web:*:*:*",
|
||
|
"versionEndExcluding": "1.52.29198",
|
||
|
"matchCriteriaId": "D0ADB517-1526-4675-8012-12A77AC3FECB"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wisdomgarden:tronclass_ilearn:2.3.2:*:*:*:*:android:*:*",
|
||
|
"matchCriteriaId": "0F51CEDF-A48E-4DD7-841D-01F562E73787"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:wisdomgarden:tronclass_ilearn:2.3.2:*:*:*:*:iphone_os:*:*",
|
||
|
"matchCriteriaId": "4D2980CF-A73D-4196-AE92-574C8096417B"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html",
|
||
|
"source": "twcert@cert.org.tw",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|