2024-07-14 02:06:08 +00:00

60 lines
2.0 KiB
JSON

{
"id": "CVE-2024-4600",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-07T12:15:10.683",
"lastModified": "2024-05-07T13:39:32.710",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery vulnerability in Socomec Net Vision, version 7.20. This vulnerability could allow an attacker to trick registered users into performing critical actions, such as adding and updating accounts, due to lack of proper sanitisation of the \u2018set_param.cgi\u2019 file."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery en Socomec Net Vision, versi\u00f3n 7.20. Esta vulnerabilidad podr\u00eda permitir a un atacante enga\u00f1ar a los usuarios registrados para que realicen acciones cr\u00edticas, como agregar y actualizar cuentas, debido a la falta de una desinfecci\u00f3n adecuada del archivo 'set_param.cgi'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-socomec-net-vision",
"source": "cve-coordination@incibe.es"
}
]
}