mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
60 lines
1.9 KiB
JSON
60 lines
1.9 KiB
JSON
{
|
|
"id": "CVE-2024-1882",
|
|
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
|
"published": "2024-03-14T04:15:08.003",
|
|
"lastModified": "2024-09-26T04:15:07.377",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Esta vulnerabilidad permite que un usuario administrador ya autenticado cree un payload malicioso que podr\u00eda aprovecharse para la ejecuci\u00f3n remota de c\u00f3digo en el servidor que aloja el servidor de aplicaciones PaperCut NG/MF."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-76"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.papercut.com/kb/Main/Security-Bulletin-March-2024",
|
|
"source": "eb41dac7-0af8-4f84-9f6d-0272772514f4"
|
|
}
|
|
]
|
|
} |