2025-02-16 03:03:51 +00:00

64 lines
3.0 KiB
JSON

{
"id": "CVE-2025-24968",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-04T20:15:50.997",
"lastModified": "2025-02-04T20:15:50.997",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "reNgine is an automated reconnaissance framework for web applications. An unrestricted project deletion vulnerability allows attackers with specific roles, such as `penetration_tester` or `auditor` to delete all projects in the system. This can lead to a complete system takeover by redirecting the attacker to the onboarding page, where they can add or modify users, including Sys Admins, and configure critical settings like API keys and user preferences. This issue affects all versions up to and including 2.20. Users are advised to monitor the project for future releases which address this issue. There are no known workarounds."
},
{
"lang": "es",
"value": "reNgine es un sistema de reconocimiento automatizado framework para aplicaciones web. Una vulnerabilidad de eliminaci\u00f3n de proyectos sin restricciones permite a los atacantes con roles espec\u00edficos, como `penetration_tester` o `auditor`, eliminar todos los proyectos en sistema. Esto puede provocar una toma de control completa del sistema al redirigir al atacante a la p\u00e1gina de incorporaci\u00f3n, donde puede agregar o modificar usuarios, administradores de sistemas incluida y configurar ajustes cr\u00edticos como claves de API y preferencias de usuario. Este problema afecta a todas las versiones hasta incluida 2.20. Se recomienda a los usuarios que supervisen el proyecto en busca de futuras versiones que solucionen este problema. No se conocen workarounds."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-3327-6x79-q396",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}