mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
64 lines
2.6 KiB
JSON
64 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-27296",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-03-01T16:15:46.413",
|
|
"lastModified": "2024-03-01T22:22:25.913",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 10.8.3, the exact Directus version number was being shipped in compiled JS bundles which are accessible without authentication. With this information a malicious attacker can trivially look for known vulnerabilities in Directus core or any of its shipped dependencies in that specific running version. The problem has been resolved in versions 10.8.3 and newer."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Directus es una API y un panel de aplicaciones en tiempo real para administrar el contenido de la base de datos SQL. Antes de la versi\u00f3n 10.8.3, el n\u00famero exacto de versi\u00f3n de Directus se enviaba en paquetes JS compilados a los que se pod\u00eda acceder sin autenticaci\u00f3n. Con esta informaci\u00f3n, un atacante malicioso puede buscar trivialmente vulnerabilidades conocidas en el n\u00facleo de Directus o cualquiera de sus dependencias enviadas en esa versi\u00f3n en ejecuci\u00f3n espec\u00edfica. El problema se resolvi\u00f3 en las versiones 10.8.3 y posteriores."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |