2025-03-23 03:03:54 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2024-9362",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:48.220",
"lastModified": "2025-03-20T10:15:48.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated directory traversal vulnerability exists in Polyaxon, affecting the latest version. This vulnerability allows an attacker to retrieve directory information and file contents from the server without proper authorization, leading to sensitive information disclosure. The issue enables access to system directories such as `/etc`, potentially resulting in significant security risks."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de navegaci\u00f3n de directorios no autenticada en Polyaxon, que afecta a la \u00faltima versi\u00f3n. Esta vulnerabilidad permite a un atacante recuperar informaci\u00f3n de directorios y el contenido de archivos del servidor sin la debida autorizaci\u00f3n, lo que conlleva la divulgaci\u00f3n de informaci\u00f3n confidencial. El problema permite el acceso a directorios del sistema como `/etc`, lo que podr\u00eda generar importantes riesgos de seguridad."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/d8dcb40f-ce76-4524-8d06-e0f12a07809d",
"source": "security@huntr.dev"
}
]
}