{ "id": "CVE-2024-37403", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-07T04:17:18.653", "lastModified": "2024-08-07T04:17:18.653", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ivanti Docs@Work for Android, before 2.26.0 is affected by the 'Dirty Stream' vulnerability. The application fails to properly sanitize file names, resulting in a path traversal-affiliated vulnerability. This potentially enables other malicious apps on the device to read sensitive information stored in the app root." } ], "metrics": { "cvssMetricV30": [ { "source": "support@hackerone.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.3, "impactScore": 3.6 } ] }, "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-CVE-2024-37403-Dirty-Stream-for-Ivanti-Docs-Work-for-Android", "source": "support@hackerone.com" } ] }