2024-12-10 17:03:57 +00:00

60 lines
2.4 KiB
JSON

{
"id": "CVE-2024-55579",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-09T03:15:05.197",
"lastModified": "2024-12-10T15:15:08.163",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Qlik Sense Enterprise for Windows before November 2024 IR. An unprivileged user with network access may be able to create connection objects that trigger execution of arbitrary EXE files. This is fixed in November 2024 IR, May 2024 Patch 10, February 2024 Patch 14, November 2023 Patch 16, August 2023 Patch 16, May 2023 Patch 18, and February 2023 Patch 15."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Qlik Sense Enterprise para Windows antes de la revisi\u00f3n de implementaci\u00f3n de noviembre de 2024. Un usuario sin privilegios con acceso a la red podr\u00eda crear objetos de conexi\u00f3n que activen la ejecuci\u00f3n de archivos EXE arbitrarios. Esto se solucion\u00f3 en la revisi\u00f3n de implementaci\u00f3n de noviembre de 2024, el parche 10 de mayo de 2024, el parche 14 de febrero de 2024, el parche 16 de noviembre de 2023, el parche 16 de agosto de 2023, el parche 18 de mayo de 2023 y el parche 15 de febrero de 2023."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows-CVEs/tac-p/2496004",
"source": "cve@mitre.org"
}
]
}