2024-10-13 02:03:17 +00:00

60 lines
2.0 KiB
JSON

{
"id": "CVE-2024-3318",
"sourceIdentifier": "psirt@sailpoint.com",
"published": "2024-05-15T16:15:10.963",
"lastModified": "2024-05-15T16:40:19.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the \u201cfile\u201c attribute, which in turn allowed the user to access files uploaded for other sources."
},
{
"lang": "es",
"value": "Se identific\u00f3 una vulnerabilidad de path traversal de archivo en el conector en la nube DelimitedFileConnector que permit\u00eda a un administrador autenticado establecer atributos de conector arbitrarios, incluido el atributo \u201carchivo\u201d, lo que a su vez permit\u00eda al usuario acceder a archivos cargados para otras fuentes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@sailpoint.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@sailpoint.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.sailpoint.com/security-advisories/",
"source": "psirt@sailpoint.com"
}
]
}