mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
63 lines
3.0 KiB
JSON
63 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2024-31220",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-04-05T15:15:08.060",
|
|
"lastModified": "2024-04-08T18:49:25.863",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Sunshine is a self-hosted game stream host for Moonlight. Starting in version 0.16.0 and prior to version 0.18.0, an attacker may be able to remotely read arbitrary files without authentication due to a path traversal vulnerability. Users who exposed the Sunshine configuration web user interface outside of localhost may be affected, depending on firewall configuration. To exploit vulnerability, attacker could make an http/s request to the `node_modules` endpoint if user exposed Sunshine config web server to internet or attacker is on the LAN. Version 0.18.0 contains a patch for this issue. As a workaround, one may block access to Sunshine via firewall."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Sunshine es un anfitri\u00f3n de transmisi\u00f3n de juegos autohospedado para Moonlight. A partir de la versi\u00f3n 0.16.0 y anteriores a la versi\u00f3n 0.18.0, un atacante puede leer de forma remota archivos arbitrarios sin autenticaci\u00f3n debido a una vulnerabilidad de path traversal. Los usuarios que expusieron la interfaz de usuario web de configuraci\u00f3n de Sunshine fuera de localhost pueden verse afectados, dependiendo de la configuraci\u00f3n del firewall. Para explotar la vulnerabilidad, el atacante podr\u00eda realizar una solicitud http/s al endpoint `node_modules` si el usuario expuso el servidor web de configuraci\u00f3n Sunshine a Internet o el atacante est\u00e1 en la LAN. La versi\u00f3n 0.18.0 contiene un parche para este problema. Como workaround, se puede bloquear el acceso a Sunshine mediante un firewall."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 7.3,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/LizardByte/Sunshine/releases/tag/v0.18.0",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/LizardByte/Sunshine/security/advisories/GHSA-6rg7-7m3w-w5wc",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |