2023-08-22 20:00:42 +00:00
{
"id" : "CVE-2023-24516" ,
"sourceIdentifier" : "cve-coordination@incibe.es" ,
"published" : "2023-08-22T19:16:34.557" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:48:02.007" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-08-22 20:00:42 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site Scripting (XSS) vulnerability in the Pandora FMS Special Days component allows an attacker to use it to steal the session cookie value of admin users easily with little user interaction. This issue affects Pandora FMS v767 version and prior versions on all platforms."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de Cross-site Scripting (XSS) en el componente Pandora FMS Special Days FMS permite a un atacante utilizarlo para robar el valor de la cookie de sesi\u00f3n de los usuarios administradores f\u00e1cilmente con poca interacci\u00f3n del usuario. Este problema afecta a la versi\u00f3n v767 de Pandora FMS y versiones anteriores en todas las plataformas."
2023-08-22 20:00:42 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-08-26 04:00:39 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "cve-coordination@incibe.es" ,
"type" : "Secondary" ,
2023-08-26 04:00:39 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" ,
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM" ,
2023-08-26 04:00:39 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2023-08-26 04:00:39 +00:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
2024-12-08 03:06:42 +00:00
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
2023-08-26 04:00:39 +00:00
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "LOW"
2023-08-26 04:00:39 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.2 ,
"impactScore" : 4.7
2023-08-26 04:00:39 +00:00
} ,
2023-08-22 20:00:42 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-08-22 20:00:42 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" ,
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM" ,
2023-08-22 20:00:42 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2023-08-22 20:00:42 +00:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
2024-12-08 03:06:42 +00:00
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
2023-08-22 20:00:42 +00:00
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-08-22 20:00:42 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.3 ,
"impactScore" : 2.7
2023-08-22 20:00:42 +00:00
}
]
} ,
"weaknesses" : [
2023-08-26 04:00:39 +00:00
{
2023-10-16 12:00:28 +00:00
"source" : "cve-coordination@incibe.es" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-08-26 04:00:39 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
} ,
2023-08-22 20:00:42 +00:00
{
2023-10-16 12:00:28 +00:00
"source" : "nvd@nist.gov" ,
2023-08-22 20:00:42 +00:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2023-08-26 04:00:39 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "767" ,
"matchCriteriaId" : "E3F21FDE-5E11-4117-9E57-DD3E5C7B3DE3"
}
]
}
]
}
] ,
2023-08-22 20:00:42 +00:00
"references" : [
2023-10-16 12:00:28 +00:00
{
"url" : "https://gist.github.com/Argonx21/5ef4d123c975285b3a42835c8e81603a" ,
2023-11-02 03:00:24 +00:00
"source" : "cve-coordination@incibe.es" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-10-16 12:00:28 +00:00
} ,
2023-08-22 20:00:42 +00:00
{
"url" : "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/" ,
2023-08-26 04:00:39 +00:00
"source" : "cve-coordination@incibe.es" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://gist.github.com/Argonx21/5ef4d123c975285b3a42835c8e81603a" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-08-22 20:00:42 +00:00
}
]
}