2024-12-08 03:06:42 +00:00

127 lines
4.6 KiB
JSON

{
"id": "CVE-2024-41108",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-31T19:15:12.110",
"lastModified": "2024-09-05T16:27:50.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be retrieved if a task is pending on that host.\u00a0Otherwise, an error message containing \"Invalid tasking!\" will be returned. The domainpassword in the hostinfo dump is hidden even to authenticated users, as it is displayed as a row of asterisks when navigating to the host's Active Directory settings. This vulnerability is fixed in 1.5.10.41."
},
{
"lang": "es",
"value": "FOG es un sistema gratuito de gesti\u00f3n de inventario, im\u00e1genes, clonaci\u00f3n y rescate de c\u00f3digo abierto. Falta el control de acceso de la p\u00e1gina hostinfo o \u00e9ste es inadecuado, ya que solo se requiere la direcci\u00f3n mac del host para obtener la informaci\u00f3n de configuraci\u00f3n. Estos datos solo se pueden recuperar si hay una tarea pendiente en ese host. De lo contrario, aparecer\u00e1 un mensaje de error que contiene \"\u00a1Invalid tasking!\" Ser\u00e1 devuelto. La contrase\u00f1a de dominio en el volcado de informaci\u00f3n del host est\u00e1 oculta incluso para los usuarios autenticados, ya que se muestra como una fila de asteriscos al navegar a la configuraci\u00f3n de Active Directory del host. Esta vulnerabilidad se solucion\u00f3 en 1.5.10.41."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5.10",
"versionEndExcluding": "1.5.10.41",
"matchCriteriaId": "0DD7BD8A-1B66-4868-92EC-0C2A142B937E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostinfo.php",
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostname.php",
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}