2024-12-08 03:06:42 +00:00

64 lines
2.8 KiB
JSON

{
"id": "CVE-2024-50672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T21:15:19.523",
"lastModified": "2024-11-27T17:15:12.563",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n NoSQL en Adapt Learning Adapt Authoring Tool &lt;= 0.11.3 permite a atacantes no autenticados restablecer las contrase\u00f1as de cuentas de usuario y administrador a trav\u00e9s de la funci\u00f3n \"Restablecer contrase\u00f1a\". La vulnerabilidad se produce debido a una validaci\u00f3n insuficiente de la entrada del usuario, que se utiliza como consulta en la funci\u00f3n find() de Mongoose. Esto permite a los atacantes realizar una toma de control total de la cuenta de administrador. Los atacantes pueden utilizar los privilegios administrativos reci\u00e9n obtenidos para cargar un complemento personalizado para realizar la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor que aloja la aplicaci\u00f3n web."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/adaptlearning/adapt_authoring",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/dos-m0nk3y/CVE/tree/main/CVE-2024-50672",
"source": "cve@mitre.org"
}
]
}