mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
68 lines
2.9 KiB
JSON
68 lines
2.9 KiB
JSON
{
|
|
"id": "CVE-2025-24891",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2025-01-31T23:15:08.457",
|
|
"lastModified": "2025-01-31T23:15:08.457",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Dumb Drop is a file upload application. Users with permission to upload to the service are able to exploit a path traversal vulnerability to overwrite arbitrary system files. As the container runs as root by default, there is no limit to what can be overwritten. With this, it's possible to inject malicious payloads into files ran on schedule or upon certain service actions. As the service is not required to run with authentication enabled, this may permit wholly unprivileged users root access. Otherwise, anybody with a PIN."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Dumb Drop es una aplicaci\u00f3n de carga de archivos. Los usuarios con permiso para cargar archivos en el servicio pueden explotar una vulnerabilidad Path Traversal para sobrescribir archivos sistema arbitrarios. Como el contenedor se ejecuta como superusuario de forma predeterminada, no hay l\u00edmite para lo que se puede sobrescribir. Con esto, es posible inyectar payloads maliciosos en archivos que se ejecutan seg\u00fan lo programado o en determinadas acciones del servicio. Como no se requiere que el servicio se ejecute con la autenticaci\u00f3n habilitada, esto puede permitir el acceso superusuario a usuarios totalmente sin privilegios. De lo contrario, cualquier persona con un PIN."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
"baseScore": 9.6,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 6.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-276"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/DumbWareio/DumbDrop/commit/cb586316648ccbfb21d27b84e90d72ccead9819d",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/DumbWareio/DumbDrop/security/advisories/GHSA-24f2-fv38-3274",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |