mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
68 lines
2.5 KiB
JSON
68 lines
2.5 KiB
JSON
{
|
|
"id": "CVE-2024-8096",
|
|
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
|
|
"published": "2024-09-11T10:15:02.883",
|
|
"lastModified": "2024-09-11T16:26:11.920",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cuando se le indica a curl que utilice la extensi\u00f3n TLS de solicitud de estado de certificado, a menudo denominada como grapado OCSP, para verificar que el certificado del servidor es v\u00e1lido, es posible que no detecte algunos problemas de OCSP y, en cambio, considere err\u00f3neamente que la respuesta es correcta. Si el estado devuelto informa un error distinto de \"revocado\" (como, por ejemplo, \"no autorizado\"), no se trata como un certificado incorrecto."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 2.5
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-295"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://curl.se/docs/CVE-2024-8096.html",
|
|
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
|
},
|
|
{
|
|
"url": "https://curl.se/docs/CVE-2024-8096.json",
|
|
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
|
},
|
|
{
|
|
"url": "https://hackerone.com/reports/2669852",
|
|
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
|
|
}
|
|
]
|
|
} |