2024-07-12 23:58:11 +00:00
{
"id" : "CVE-2024-31947" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-07-12T23:15:10.000" ,
2025-03-14 17:03:51 +00:00
"lastModified" : "2025-03-14T15:15:40.603" ,
2024-12-08 03:06:42 +00:00
"vulnStatus" : "Modified" ,
2024-07-12 23:58:11 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "StoneFly Storage Concentrator (SC and SCVM) before 8.0.4.26 allows Directory Traversal by authenticated users. Using a crafted path parameter with the Online Help facility can expose sensitive system information."
2024-07-15 14:03:11 +00:00
} ,
{
"lang" : "es" ,
"value" : "StoneFly Storage Concentrator (SC y SCVM) anterior a 8.0.4.26 permite el Directory Traversal por parte de usuarios autenticados. El uso de un par\u00e1metro de ruta manipulado con la funci\u00f3n de ayuda en l\u00ednea puede exponer informaci\u00f3n confidencial del sistema."
2024-07-12 23:58:11 +00:00
}
] ,
2024-09-10 18:03:16 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2024-09-10 18:03:16 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-09-10 18:03:16 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
2025-03-14 17:03:51 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
2024-09-10 18:03:16 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
2025-03-14 17:03:51 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
2024-09-10 18:03:16 +00:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stonefly:storage_concentrator:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "8.0.4.26" ,
"matchCriteriaId" : "C6B5A97E-4A8E-4A48-BEAA-E72680F107CA"
}
]
}
]
}
] ,
2024-07-12 23:58:11 +00:00
"references" : [
{
"url" : "https://stonefly.com" ,
2024-09-10 18:03:16 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
2024-07-12 23:58:11 +00:00
} ,
{
"url" : "https://stonefly.com/security-advisories/cve-2024-31947/" ,
2024-09-10 18:03:16 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://stonefly.com" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
} ,
{
"url" : "https://stonefly.com/security-advisories/cve-2024-31947/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-07-12 23:58:11 +00:00
}
]
}