mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
48 lines
1.8 KiB
JSON
48 lines
1.8 KiB
JSON
{
|
|
"id": "CVE-2024-38807",
|
|
"sourceIdentifier": "security@vmware.com",
|
|
"published": "2024-08-23T09:15:07.453",
|
|
"lastModified": "2024-08-23T16:18:28.547",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Applications that use spring-boot-loader\u00a0or spring-boot-loader-classic\u00a0and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las aplicaciones que utilizan spring-boot-loader o spring-boot-loader-classic y contienen c\u00f3digo personalizado que realiza la verificaci\u00f3n de firmas de archivos jar anidados pueden ser vulnerables a la falsificaci\u00f3n de firmas cuando el contenido que parece haber sido firmado por un firmante, de hecho, sido firmado por otro."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@vmware.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.0,
|
|
"impactScore": 5.2
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://spring.io/security/cve-2024-38807",
|
|
"source": "security@vmware.com"
|
|
}
|
|
]
|
|
} |