2024-11-13 07:03:20 +00:00
{
"id" : "CVE-2024-52268" ,
"sourceIdentifier" : "vultures@jpcert.or.jp" ,
"published" : "2024-11-13T06:15:14.903" ,
2024-11-19 17:03:31 +00:00
"lastModified" : "2024-11-19T15:57:03.780" ,
"vulnStatus" : "Analyzed" ,
2024-11-13 07:03:20 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site scripting vulnerability exists in VK All in One Expansion Unit versions prior to 9.100.1.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing the web site using the product."
2024-11-13 19:03:36 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad de Cross Site Scripting en las versiones de VK All in One Expansion Unit anteriores a la 9.100.1.0. Si se aprovecha esta vulnerabilidad, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario que accede al sitio web mediante el producto."
2024-11-13 07:03:20 +00:00
}
] ,
"metrics" : {
2024-11-19 17:03:31 +00:00
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM" ,
2024-11-19 17:03:31 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-11-19 17:03:31 +00:00
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
}
] ,
2024-11-13 07:03:20 +00:00
"cvssMetricV30" : [
{
"source" : "vultures@jpcert.or.jp" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM" ,
2024-11-13 07:03:20 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-11-13 07:03:20 +00:00
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
}
]
} ,
"weaknesses" : [
{
"source" : "vultures@jpcert.or.jp" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2024-11-19 17:03:31 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vektor-inc:vk_all_in_one_expansion_unit:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "9.100.1.0" ,
"matchCriteriaId" : "5C50E627-160C-4091-A630-E38CBC029967"
}
]
}
]
}
] ,
2024-11-13 07:03:20 +00:00
"references" : [
{
"url" : "https://jvn.jp/en/jp/JVN05136799/" ,
2024-11-19 17:03:31 +00:00
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Third Party Advisory"
]
2024-11-13 07:03:20 +00:00
} ,
{
"url" : "https://vektor-inc.co.jp/en/update/regarding-vulnerabilities-in-vk-all-in-one-expansion-unit-version-9-100-0-and-earlier/" ,
2024-11-19 17:03:31 +00:00
"source" : "vultures@jpcert.or.jp" ,
"tags" : [
"Vendor Advisory"
]
2024-11-13 07:03:20 +00:00
}
]
}