2024-12-08 03:06:42 +00:00

118 lines
4.0 KiB
JSON

{
"id": "CVE-2024-37352",
"sourceIdentifier": "SecurityResponse@netmotionsoftware.com",
"published": "2024-06-20T18:15:12.590",
"lastModified": "2024-11-21T09:23:42.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a cross-site scripting vulnerability in the\nmanagement UI of Absolute Secure Access prior to version 13.06 that allows\nattackers with system administrator permissions to interfere with other system\nadministrators\u2019 use of the management UI when the second administrator accesses\nthe vulnerable page. The scope is unchanged, there is no loss of\nconfidentiality. Impact to system integrity is high, impact to system\navailability is none."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross Site Scripting en la interfaz de usuario de administraci\u00f3n de Absolute Secure Access anterior a la versi\u00f3n 13.06 que permite a atacantes con permisos de administrador del sistema interferir con el uso de la interfaz de usuario de administraci\u00f3n por parte de otros administradores del sistema cuando el segundo administrador accede a la p\u00e1gina vulnerable. El alcance no cambia, no hay p\u00e9rdida de confidencialidad. El impacto en la integridad del sistema es alto, el impacto en la disponibilidad del sistema es nulo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
"baseScore": 3.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "SecurityResponse@netmotionsoftware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:absolute:secure_access:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.06",
"matchCriteriaId": "1113DB3C-BD71-42ED-A4AF-0098AA744FD8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37352/",
"source": "SecurityResponse@netmotionsoftware.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37352/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}