2025-03-11 03:03:47 +00:00

72 lines
2.5 KiB
JSON

{
"id": "CVE-2024-57968",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T20:15:36.550",
"lastModified": "2025-03-11T01:00:03.127",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this."
},
{
"lang": "es",
"value": "Las versiones anteriores a 2024.4.2.1 de Advantive VeraCore permiten que usuarios autenticados de forma remota carguen archivos en carpetas no deseadas (por ejemplo, aquellas a las que otros usuarios pueden acceder durante la navegaci\u00f3n web). Se puede usar upload.aspx para esto."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"cisaExploitAdd": "2025-03-10",
"cisaActionDue": "2025-03-31",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Advantive VeraCore Unrestricted File Upload Vulnerability",
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://advantive.my.site.com/support/s/article/VeraCore-Release-Notes-2024-4-2-1",
"source": "cve@mitre.org"
},
{
"url": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/",
"source": "cve@mitre.org"
},
{
"url": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/",
"source": "cve@mitre.org"
}
]
}