2024-10-10 14:03:23 +00:00

56 lines
2.1 KiB
JSON

{
"id": "CVE-2024-35288",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T04:15:08.233",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nitro PDF Pro before 13.70.8.82 and 14.x before 14.26.1.0 allows Local Privilege Escalation in the MSI Installer because custom actions occur unsafely in repair mode. CertUtil is run in a conhost.exe window, and there is a mechanism allowing CTRL+o to launch cmd.exe as NT AUTHORITY\\SYSTEM."
},
{
"lang": "es",
"value": "Las versiones anteriores a la 13.70.8.82 y 14.x anteriores a la 14.26.1.0 de Nitro PDF Pro permiten la escalada de privilegios locales en el instalador MSI porque las acciones personalizadas se ejecutan de forma insegura en el modo de reparaci\u00f3n. CertUtil se ejecuta en una ventana conhost.exe y hay un mecanismo que permite que CTRL+o inicie cmd.exe como NT AUTHORITY\\SYSTEM."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-nitro-pdf-pro/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2024/Sep/59",
"source": "cve@mitre.org"
},
{
"url": "https://www.gonitro.com/support/downloads#securityUpdates",
"source": "cve@mitre.org"
}
]
}