2024-12-08 03:06:42 +00:00

110 lines
3.7 KiB
JSON

{
"id": "CVE-2024-43791",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-08-23T15:15:16.830",
"lastModified": "2024-09-12T18:26:31.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RequestStore provides per-request global storage for Rack. The files published as part of request_store 1.3.2 have 0666 permissions, meaning that they are world-writable, which allows local users to execute arbitrary code. This version was published in 2017, and most production environments do not allow access for local users, so the chances of this being exploited are very low, given that the vast majority of users will have upgraded, and those that have not, if any, are not likely to be exposed."
},
{
"lang": "es",
"value": "RequestStore proporciona almacenamiento global por solicitud para Rack. Los archivos publicados como parte de request_store 1.3.2 tienen permisos 0666, lo que significa que se pueden escribir en todo el mundo, lo que permite a los usuarios locales ejecutar c\u00f3digo arbitrario. Esta versi\u00f3n se public\u00f3 en 2017, y la mayor\u00eda de entornos de producci\u00f3n no permiten el acceso a usuarios locales, por lo que las posibilidades de que esto sea explotado son muy bajas, dado que la gran mayor\u00eda de usuarios habr\u00e1n actualizado, y los que no, en su caso, no es probable que queden expuestos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:steveklabnik:request_store:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0B3C3B50-C36E-4263-8E50-2CA2F483BD83"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}