2024-07-14 02:06:08 +00:00

68 lines
2.2 KiB
JSON

{
"id": "CVE-2024-3459",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-05-14T15:41:12.060",
"lastModified": "2024-05-14T16:11:39.510",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "KioWare for Windows (versions all\u00a0through 8.34)\u00a0allows to escape the environment by downloading PDF files, which then by default are opened in an external PDF viewer. By using built-in functions of that viewer it is possible to launch a web browser, search through local files and, subsequently, launch any program with user privileges.\n\n"
},
{
"lang": "es",
"value": "KioWare para Windows (versiones hasta 8.34) permite escapar del entorno descargando archivos PDF, que luego se abren de forma predeterminada en un visor de PDF externo. Al utilizar las funciones integradas de ese visor, es posible iniciar un navegador web, buscar en archivos locales y, posteriormente, iniciar cualquier programa con privilegios de usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-424"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
},
{
"url": "https://www.kioware.com/",
"source": "cvd@cert.pl"
}
]
}