2024-12-08 03:06:42 +00:00

68 lines
3.2 KiB
JSON

{
"id": "CVE-2024-38353",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-10T20:15:04.053",
"lastModified": "2024-11-21T09:25:25.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.\n"
},
{
"lang": "es",
"value": "CodiMD permite notas de markdown colaborativas en tiempo real en todas las plataformas. A CodiMD anterior a 2.5.4 le falta una vulnerabilidad de autenticaci\u00f3n y control de acceso que permite a un atacante no autenticado obtener acceso no autorizado a los datos de im\u00e1genes cargados en CodiMD. CodiMD no requiere una autenticaci\u00f3n v\u00e1lida para acceder a las im\u00e1genes cargadas o para cargar nuevos datos de im\u00e1genes. Un atacante que pueda determinar la URL de una imagen cargada puede obtener acceso no autorizado a los datos de la imagen cargada. Debido a la generaci\u00f3n insegura de nombres de archivos aleatorios en la librer\u00eda Formidable subyacente, un atacante puede determinar los nombres de archivos de im\u00e1genes cargadas previamente y aumenta la probabilidad de que este problema sea explotado. Esta vulnerabilidad se solucion\u00f3 en 2.5.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/hackmdio/codimd/security/advisories/GHSA-2764-jppc-p2hm",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/hackmdio/codimd/security/advisories/GHSA-2764-jppc-p2hm",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}