2024-07-14 02:06:08 +00:00

116 lines
4.0 KiB
JSON

{
"id": "CVE-2024-23768",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-22T03:15:08.203",
"lastModified": "2024-01-26T19:15:05.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dremio before 24.3.1 allows path traversal. An authenticated user who has no privileges on certain folders (and the files and datasets in these folders) can access these folders, files, and datasets. To be successful, the user must have access to the source and at least one folder in the source. Affected versions are: 24.0.0 through 24.3.0, 23.0.0 through 23.2.3, and 22.0.0 through 22.2.2. Fixed versions are: 24.3.1 and later, 23.2.4 and later, and 22.2.3 and later."
},
{
"lang": "es",
"value": "Dremio anterior a 24.3.1 permite path traversal. Un usuario autenticado que no tiene privilegios en determinadas carpetas (y en los archivos y conjuntos de datos de estas carpetas) puede acceder a estas carpetas, archivos y conjuntos de datos. Para tener \u00e9xito, el usuario debe tener acceso a la fuente y al menos a una carpeta en la fuente. Las versiones afectadas son: 24.0.0 a 24.3.0, 23.0.0 a 23.2.3 y 22.0.0 a 22.2.2. Las versiones fijas son: 24.3.1 y posteriores, 23.2.4 y posteriores, y 22.2.3 y posteriores."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dremio:dremio:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.0.0",
"versionEndExcluding": "22.2.3",
"matchCriteriaId": "6E0467E7-C667-4595-8094-5F18CCF72192"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dremio:dremio:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.2.4",
"matchCriteriaId": "EFF5F865-AD00-4E6D-B888-6EE8AF6E7971"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dremio:dremio:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.3.1",
"matchCriteriaId": "ECA6987B-10A4-46C6-A99B-2474B40676D9"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.dremio.com/current/reference/bulletins/2024-01-12-01",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}