2024-07-04 06:03:50 +00:00

72 lines
3.1 KiB
JSON

{
"id": "CVE-2024-27176",
"sourceIdentifier": "ecc0f906-8666-484c-bcf8-c3b7520a72f0",
"published": "2024-06-14T04:15:37.640",
"lastModified": "2024-07-04T05:15:15.017",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker can get Remote Code Execution by overwriting files. Overwriting files is enable by falsifying session ID variable. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the \"Base Score\" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point.\n https://www.toshibatec.com/contacts/products/ \nAs for the affected products/models/versions, see the reference URL."
},
{
"lang": "es",
"value": "Un atacante puede obtener la ejecuci\u00f3n remota de c\u00f3digo sobrescribiendo archivos. La sobrescritura de archivos se permite falsificando la variable de ID de sesi\u00f3n. Esta vulnerabilidad se puede ejecutar en combinaci\u00f3n con otras vulnerabilidades y es dif\u00edcil de ejecutar sola. Por lo tanto, la puntuaci\u00f3n CVSS para esta vulnerabilidad por s\u00ed sola es inferior a la puntuaci\u00f3n que figura en la \"Puntuaci\u00f3n base\" de esta vulnerabilidad. Para obtener detalles sobre otras vulnerabilidades relacionadas, consulte al siguiente punto de contacto. https://www.toshibatec.com/contacts/products/ En cuanto a los productos/modelos/versiones afectados, consulte la URL de referencia."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ecc0f906-8666-484c-bcf8-c3b7520a72f0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ecc0f906-8666-484c-bcf8-c3b7520a72f0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jul/1",
"source": "ecc0f906-8666-484c-bcf8-c3b7520a72f0"
},
{
"url": "https://jvn.jp/en/vu/JVNVU97136265/index.html",
"source": "ecc0f906-8666-484c-bcf8-c3b7520a72f0"
},
{
"url": "https://www.toshibatec.com/information/20240531_01.html",
"source": "ecc0f906-8666-484c-bcf8-c3b7520a72f0"
},
{
"url": "https://www.toshibatec.com/information/pdf/information20240531_01.pdf",
"source": "ecc0f906-8666-484c-bcf8-c3b7520a72f0"
}
]
}