{ "id": "CVE-2024-45652", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-01-19T03:15:06.647", "lastModified": "2025-01-19T03:15:06.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Maximo MXAPIASSET API 7.6.1.3 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system." }, { "lang": "es", "value": "La API MXAPIASSET de IBM Maximo 7.6.1.3 podr\u00eda permitir que un atacante remoto recorra directorios en sistema. Un atacante podr\u00eda enviar una solicitud de URL manipulado especial que contenga secuencias de \"punto punto\" (/../) para ver archivos arbitrarios en el directorio sistema." } ], "metrics": { "cvssMetricV31": [ { "source": "psirt@us.ibm.com", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "psirt@us.ibm.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7174820", "source": "psirt@us.ibm.com" } ] }