mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
80 lines
2.7 KiB
JSON
80 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-4423",
|
|
"sourceIdentifier": "cvd@cert.pl",
|
|
"published": "2024-05-14T15:43:40.150",
|
|
"lastModified": "2024-11-21T09:42:47.973",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The access control in\u00a0CemiPark software does not properly validate user-entered data, which allows the authentication bypass. An attacker who has network access to the login panel can log in with administrator rights to the application.This issue affects CemiPark software: 4.5, 4.7, 5.03 and potentially others. The vendor refused to provide the specific range of affected products.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El control de acceso en el software CemiPark no valida adecuadamente los datos ingresados por el usuario, lo que permite omitir la autenticaci\u00f3n. Un atacante que tenga acceso de red al panel de inicio de sesi\u00f3n puede iniciar sesi\u00f3n con derechos de administrador en la aplicaci\u00f3n. Este problema afecta al software CemiPark: 4.5, 4.7, 5.03 y potencialmente a otros. El vendedor se neg\u00f3 a proporcionar la gama espec\u00edfica de productos afectados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cvd@cert.pl",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-89"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://cemi.pl/",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "https://cert.pl/en/posts/2024/05/CVE-2024-4423/",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "https://cert.pl/posts/2024/05/CVE-2024-4423/",
|
|
"source": "cvd@cert.pl"
|
|
},
|
|
{
|
|
"url": "http://cemi.pl/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://cert.pl/en/posts/2024/05/CVE-2024-4423/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://cert.pl/posts/2024/05/CVE-2024-4423/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |