2024-12-08 03:06:42 +00:00

130 lines
4.9 KiB
JSON

{
"id": "CVE-2024-43782",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-23T15:15:16.600",
"lastModified": "2024-09-12T18:29:50.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This openedx-translations repository contains translation files from Open edX repositories to be kept in sync with Transifex. Before moving to pulling translations from the openedx-translations repository via openedx-atlas, translations in the edx-platform repository were validated using edx-i18n-tools. This validation included protection against malformed translations and translations-based script injections. Prior to this patch, the validation implemented in the openedx-translations repository did not include the same protections. The maintainer inspected the translations in the edx-platform directory of both the main and open-release/redwood.master branches of the openedx-translations repository and found no evidence of exploited translation strings."
},
{
"lang": "es",
"value": "Este repositorio de openx-translations contiene archivos de traducci\u00f3n de los repositorios de Open edX que se mantendr\u00e1n sincronizados con Transifex. Antes de pasar a extraer traducciones del repositorio de openx-translations a trav\u00e9s de openx-atlas, las traducciones en el repositorio de edx-platform se validaron utilizando edx-i18n-tools. Esta validaci\u00f3n incluy\u00f3 protecci\u00f3n contra traducciones con formato incorrecto e inyecciones de scripts basados en traducciones. Antes de este parche, la validaci\u00f3n implementada en el repositorio de openx-translations no inclu\u00eda las mismas protecciones. El fabricante inspeccion\u00f3 las traducciones en el directorio edx-platform de las ramas principal y open-release/redwood.master del repositorio openx-translations y no encontr\u00f3 evidencia de cadenas de traducci\u00f3n explotadas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 5.8
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openedx:openedx:redwood1:*:*:*:*:*:*:*",
"matchCriteriaId": "0147BA00-D21D-4562-96C9-70F1C5351B3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openedx:openedx:redwood2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E709C02-0F0A-434E-A67C-5A21D453B5D1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openedx/openedx-translations/commit/3c4093705dec99590577c4d8270ce263f7fffc5a",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/openedx/openedx-translations/commit/b2444340e8702c7955310331c1db5fd85b25b92b",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/openedx/openedx-translations/security/advisories/GHSA-fg8c-2pvj-wx3j",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}