mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
68 lines
2.8 KiB
JSON
68 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2024-12644",
|
|
"sourceIdentifier": "twcert@cert.org.tw",
|
|
"published": "2024-12-16T07:15:06.387",
|
|
"lastModified": "2024-12-16T07:15:06.387",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The tbm-client from Chunghwa Telecom has an Arbitrary File vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability. Attackers can copy arbitrary files on the user's system and paste them into any path, which poses a potential risk of information leakage or could consume hard drive space by copying files in large volumes."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El cliente tbm de Chunghwa Telecom tiene una vulnerabilidad de tipo Archivo arbitrario. La aplicaci\u00f3n configura un servidor web local simple y proporciona API para la comunicaci\u00f3n con el sitio web de destino. Debido a la falta de protecci\u00f3n CSRF en las API, atacantes remotos no autenticados podr\u00edan usar estas API a trav\u00e9s de phishing. Adem\u00e1s, una de las API contiene una vulnerabilidad de tipo Ruta absoluta. Los atacantes pueden copiar archivos arbitrarios en el sistema del usuario y pegarlos en cualquier ruta, lo que plantea un riesgo potencial de fuga de informaci\u00f3n o podr\u00eda consumir espacio en el disco duro al copiar archivos en grandes vol\u00famenes."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "twcert@cert.org.tw",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
|
|
"baseScore": 7.1,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 4.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "twcert@cert.org.tw",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-36"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.twcert.org.tw/en/cp-139-8302-86814-2.html",
|
|
"source": "twcert@cert.org.tw"
|
|
},
|
|
{
|
|
"url": "https://www.twcert.org.tw/tw/cp-132-8296-0f020-1.html",
|
|
"source": "twcert@cert.org.tw"
|
|
}
|
|
]
|
|
} |