2024-07-19 20:03:15 +00:00

129 lines
3.6 KiB
JSON

{
"id": "CVE-2024-6741",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-07-15T09:15:03.117",
"lastModified": "2024-07-19T18:23:40.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Openfind's Mail2000 has a vulnerability that allows the HttpOnly flag to be bypassed. Unauthenticated remote attackers can exploit this vulnerability using specific JavaScript code to obtain the session cookie with the HttpOnly flag enabled."
},
{
"lang": "es",
"value": "Mail2000 de Openfind tiene una vulnerabilidad que permite omitir el indicador HttpOnly. Los atacantes remotos no autenticados pueden aprovechar esta vulnerabilidad utilizando c\u00f3digo JavaScript espec\u00edfico para obtener la cookie de sesi\u00f3n con el indicador HttpOnly habilitado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openfind:mail2000:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1762976A-2372-49D5-BD94-77F8C0C86DC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openfind:mail2000:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC17A2D8-B006-4738-A6CB-F6B277460B6B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.openfind.com.tw/taiwan/download/Openfind_OF-ISAC-24-007.pdf",
"source": "twcert@cert.org.tw",
"tags": [
"Exploit"
]
},
{
"url": "https://www.twcert.org.tw/en/cp-139-7941-b66e7-2.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7940-0177a-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}