mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
90 lines
4.0 KiB
JSON
90 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2024-3799",
|
|
"sourceIdentifier": "cvd@cert.pl",
|
|
"published": "2024-07-10T12:15:10.180",
|
|
"lastModified": "2024-07-12T10:15:02.353",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Insecure handling of POST header parameter body\u00a0included in requests being sent to an instance of the open-source project\u00a0Phoniebox allows an attacker to create a website, which \u2013 when visited by a user \u2013 will send\u00a0malicious requests to multiple hosts on the local network. If such a request reaches the server, it will cause a\u00a0shell command execution.\n\n\nThis issue affects Phoniebox in all releases through 2.7. Newer 2.x releases were not tested, but they might also be vulnerable. \nPhoniebox in version 3.0 and higher are not affected."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El manejo inseguro del cuerpo del par\u00e1metro del encabezado POST incluido en las solicitudes que se env\u00edan a una instancia del proyecto de c\u00f3digo abierto Phoniebox permite a un atacante crear un sitio web que, cuando lo visita un usuario, enviar\u00e1 solicitudes maliciosas a m\u00faltiples hosts en la red local. Si dicha solicitud llega al servidor, provocar\u00e1 la ejecuci\u00f3n de un comando de shell. Este problema afecta a Phoniebox en todas las versiones hasta la 2.7. Las versiones m\u00e1s recientes no se probaron, pero tambi\u00e9n podr\u00edan ser vulnerables."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV40": [
|
|
{
|
|
"source": "cvd@cert.pl",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "4.0",
|
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"attackRequirements": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "PASSIVE",
|
|
"vulnerableSystemConfidentiality": "HIGH",
|
|
"vulnerableSystemIntegrity": "HIGH",
|
|
"vulnerableSystemAvailability": "HIGH",
|
|
"subsequentSystemConfidentiality": "NONE",
|
|
"subsequentSystemIntegrity": "NONE",
|
|
"subsequentSystemAvailability": "NONE",
|
|
"exploitMaturity": "NOT_DEFINED",
|
|
"confidentialityRequirements": "NOT_DEFINED",
|
|
"integrityRequirements": "NOT_DEFINED",
|
|
"availabilityRequirements": "NOT_DEFINED",
|
|
"modifiedAttackVector": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
|
"modifiedUserInteraction": "NOT_DEFINED",
|
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
|
"safety": "NOT_DEFINED",
|
|
"automatable": "NOT_DEFINED",
|
|
"recovery": "NOT_DEFINED",
|
|
"valueDensity": "NOT_DEFINED",
|
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
|
"providerUrgency": "NOT_DEFINED",
|
|
"baseScore": 8.7,
|
|
"baseSeverity": "HIGH"
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cvd@cert.pl",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://cert.pl/en/posts/2024/07/CVE-2024-3798",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "https://cert.pl/posts/2024/07/CVE-2024-3798",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2342",
|
|
"source": "cvd@cert.pl"
|
|
}
|
|
]
|
|
} |