{ "id": "CVE-2024-45836", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-09-26T05:15:12.190", "lastModified": "2024-10-03T00:35:53.797", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability exists in the web management page of PLANEX COMMUNICATIONS network cameras. If a logged-in user accesses a specific file, an arbitrary script may be executed on the web browser of the user." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross Site Scripting en la p\u00e1gina de administraci\u00f3n web de las c\u00e1maras de red PLANEX COMMUNICATIONS. Si un usuario conectado accede a un archivo espec\u00edfico, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:planex:cs-qr10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FEF99E1-D1F1-472E-B4FB-C5C0BEA5903C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:planex:cs-qr10:-:*:*:*:*:*:*:*", "matchCriteriaId": "A29EFF41-EBB0-40BB-B902-1E06991F241C" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:planex:cs-qr20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48F417C4-00BF-4DD6-B13F-5CE3689CACC3" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:planex:cs-qr20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFA7189-C7EF-4B2C-A395-C65227DC0E68" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:planex:cs-qr22_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F451BA4-F787-4A91-8159-B10CEB250F49" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:planex:cs-qr22:-:*:*:*:*:*:*:*", "matchCriteriaId": "22EF5100-73AF-4ECE-A872-0BC8DA6FAF2B" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:planex:cs-qr220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B69D307-B421-4F84-917C-410A6847F522" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:planex:cs-qr220:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F63CDED-D6F4-438D-A2CC-A51444938EAC" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:planex:cs-qr300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9F555D9-F3D2-4588-ACD8-B5E414A3594C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:planex:cs-qr300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8926972-BCAF-4FDA-82CF-7AFC5EFDB410" } ] } ] } ], "references": [ { "url": "https://jvn.jp/en/jp/JVN81966868/", "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory" ] } ] }