mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
3.5 KiB
JSON
64 lines
3.5 KiB
JSON
{
|
|
"id": "CVE-2024-4447",
|
|
"sourceIdentifier": "security@dotcms.com",
|
|
"published": "2024-07-26T02:15:10.160",
|
|
"lastModified": "2024-11-21T09:42:50.960",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In the System \u2192 Maintenance tool, the Logged Users tab surfaces sessionId data for all users via the Direct Web Remoting API (UserSessionAjax.getSessionList.dwr) calls. While this is information that would and should be available to admins who possess \"Sign In As\" powers, admins who otherwise lack this privilege would still be able to utilize the session IDs to imitate other users.\n\n\nWhile this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable \u2014 including those admins who have not been granted this ability \u2014 such as by using a session ID to generate an API token.\n\nFixed in:\u00a024.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En System ? Maintenance tool, la pesta\u00f1a Logged Users muestra datos de ID de sesi\u00f3n para todos los usuarios a trav\u00e9s de las llamadas Direct Web Remoting API (UserSessionAjax.getSessionList.dwr). Si bien esta es informaci\u00f3n que estar\u00eda y deber\u00eda estar disponible para los administradores que poseen poderes de \"Sign In As\", los administradores que de otro modo carecer\u00edan de este privilegio a\u00fan podr\u00edan utilizar las ID de sesi\u00f3n para imitar a otros usuarios. Si bien se trata de un vector de ataque muy peque\u00f1o que requiere permisos muy elevados para su ejecuci\u00f3n, su peligro radica principalmente en ofuscar la atribuci\u00f3n; todas las operaciones de Sign In As se atribuyen adecuadamente en los archivos de registro, y un administrador malintencionado podr\u00eda usar esta informaci\u00f3n para hacer que sus transacciones sean imposibles de rastrear (incluidos aquellos administradores a quienes no se les ha otorgado esta capacidad), como mediante el uso de una ID de sesi\u00f3n para generar un token API. . Corregido en: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@dotcms.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
"baseScore": 4.9,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@dotcms.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-863"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.dotcms.com/security/SI-72",
|
|
"source": "security@dotcms.com"
|
|
},
|
|
{
|
|
"url": "https://www.dotcms.com/security/SI-72",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |