mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
96 lines
4.7 KiB
JSON
96 lines
4.7 KiB
JSON
{
|
|
"id": "CVE-2024-41111",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-07-18T23:15:02.280",
|
|
"lastModified": "2024-11-21T09:32:15.313",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver version 1.6.0 (prerelease) is vulnerable to RCE on the teamserver by a low-privileged \"operator\" user. The RCE is as the system root user. The exploit is pretty fun as we make the Sliver server pwn itself. As described in a past issue (#65), \"there is a clear security boundary between the operator and server, an operator should not inherently be able to run commands or code on the server.\" An operator who exploited this vulnerability would be able to view all console logs, kick all other operators, view and modify files stored on the server, and ultimately delete the server. This issue has not yet be addressed but is expected to be resolved before the full release of version 1.6.0. Users of the 1.6.0 prerelease should avoid using Silver in production."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Sliver es un framework de trabajo de equipo rojo/emulaci\u00f3n de adversario multiplataforma de c\u00f3digo abierto que puede ser utilizado por organizaciones de todos los tama\u00f1os para realizar pruebas de seguridad. La versi\u00f3n 1.6.0 (prelanzamiento) de Sliver es vulnerable a RCE en el servidor de equipos por parte de un usuario \"operador\" con pocos privilegios. El RCE act\u00faa como usuario ra\u00edz del sistema. El exploit es bastante divertido ya que hacemos que el servidor Sliver se utilice. Como se describi\u00f3 en una edici\u00f3n anterior (#65), \"existe un l\u00edmite de seguridad claro entre el operador y el servidor, un operador no deber\u00eda poder ejecutar comandos o c\u00f3digos en el servidor\". Un operador que explotara esta vulnerabilidad podr\u00eda ver todos los registros de la consola, expulsar a todos los dem\u00e1s operadores, ver y modificar archivos almacenados en el servidor y, en \u00faltima instancia, eliminar el servidor. Este problema a\u00fan no se ha solucionado, pero se espera que se resuelva antes del lanzamiento completo de la versi\u00f3n 1.6.0. Los usuarios de la versi\u00f3n preliminar 1.6.0 deben evitar el uso de Silver en producci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.2,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-74"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/commit/5016fb8d7cdff38c79e22e8293e58300f8d3bd57",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/issues/65",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/pull/1281",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/security/advisories/GHSA-hc5w-gxxr-w8x8",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://sliver.sh/docs?name=Multi-player+Mode",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/commit/5016fb8d7cdff38c79e22e8293e58300f8d3bd57",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/issues/65",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/pull/1281",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://github.com/BishopFox/sliver/security/advisories/GHSA-hc5w-gxxr-w8x8",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://sliver.sh/docs?name=Multi-player+Mode",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |