2024-04-04 08:46:00 +00:00

59 lines
2.0 KiB
JSON

{
"id": "CVE-2024-29732",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-21T11:15:28.390",
"lastModified": "2024-03-21T12:58:51.093",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection has been found on SCAN_VISIO eDocument Suite Web Viewer of Abast. This vulnerability allows an unauthenticated user to retrieve, update and delete all the information of database. This vulnerability was found on login page via \"user\" parameter."
},
{
"lang": "es",
"value": "Se ha encontrado una inyecci\u00f3n SQL en SCAN_VISIO eDocument Suite Web Viewer de Abast. Esta vulnerabilidad permite a un usuario no autenticado recuperar, actualizar y eliminar toda la informaci\u00f3n de la base de datos. Esta vulnerabilidad se encontr\u00f3 en la p\u00e1gina de inicio de sesi\u00f3n mediante el par\u00e1metro \"usuario\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-scanvisio-edocument-suite-web-viewer-abast",
"source": "cve-coordination@incibe.es"
}
]
}