mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
93 lines
3.5 KiB
JSON
93 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2024-2365",
|
|
"sourceIdentifier": "cna@vuldb.com",
|
|
"published": "2024-03-11T00:15:17.337",
|
|
"lastModified": "2024-05-17T02:38:12.023",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability classified as problematic was found in Musicshelf 1.0/1.1 on Android. Affected by this vulnerability is an unknown functionality of the file io\\fabric\\sdk\\android\\services\\network\\PinningTrustManager.java of the component SHA-1 Handler. The manipulation leads to password hash with insufficient computational effort. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-256321 was assigned to this vulnerability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad fue encontrada en Musicshelf 1.0/1.1 en Android y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo io\\fabric\\sdk\\android\\services\\network\\PinningTrustManager.java del componente SHA-1 Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un hash de contrase\u00f1a con un esfuerzo computacional insuficiente. Es posible lanzar el ataque al dispositivo f\u00edsico. La complejidad de un ataque es bastante alta. La explotaci\u00f3n parece dif\u00edcil. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-256321."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@vuldb.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
|
"attackVector": "PHYSICAL",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 1.6,
|
|
"baseSeverity": "LOW"
|
|
},
|
|
"exploitabilityScore": 0.2,
|
|
"impactScore": 1.4
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "cna@vuldb.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:H/Au:M/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "MULTIPLE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 0.8
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@vuldb.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-916"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md",
|
|
"source": "cna@vuldb.com"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.256321",
|
|
"source": "cna@vuldb.com"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?id.256321",
|
|
"source": "cna@vuldb.com"
|
|
}
|
|
]
|
|
} |