mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
60 lines
4.4 KiB
JSON
60 lines
4.4 KiB
JSON
{
|
|
"id": "CVE-2024-45599",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-09-25T01:15:44.157",
|
|
"lastModified": "2024-09-26T13:32:02.803",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cursor is an artificial intelligence code editor. Prior to version 0.41.0, if a user on macOS has granted Cursor access to the camera or microphone, any program that is run on the machine is able to access the camera or the microphone without explicitly being granted access, through a DyLib Injection using DYLD_INSERT_LIBRARIES environment variable. The usage of `com.apple.security.cs.allow-dyld-environment-variables` and `com.apple.security.cs.disable-library-validation` allows an external dynamic library to be injected into the application using DYLD_INSERT_LIBRARIES environment variable. \nMoreover, the entitlement `com.apple.security.device.camera` allows the application to use the host camera and `com.apple.security.device.audio-input` allows the application to use the microphone. This means that untrusted code that is executed on the user's machine can access the camera or the microphone, if the user has already given permission for Cursor to do so. In version 0.41.0, the entitlements have been split by process: the main process gets the camera and microphone entitlements, but not the DyLib entitlements, whereas the extension host process gets the DyLib entitlements but not the camera or microphone entitlements. As a workaround, do not explicitly give Cursor the permission to access the camera or microphone if untrusted users can run arbitrary commands on the affected machine."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Cursor es un editor de c\u00f3digo de inteligencia artificial. Antes de la versi\u00f3n 0.41.0, si un usuario en macOS le hab\u00eda otorgado a Cursor acceso a la c\u00e1mara o al micr\u00f3fono, cualquier programa que se ejecutara en la m\u00e1quina pod\u00eda acceder a la c\u00e1mara o al micr\u00f3fono sin que se le otorgara acceso expl\u00edcito, a trav\u00e9s de una inyecci\u00f3n DyLib utilizando la variable de entorno DYLD_INSERT_LIBRARIES. El uso de `com.apple.security.cs.allow-dyld-environment-variables` y `com.apple.security.cs.disable-library-validation` permite que se inyecte una librer\u00eda din\u00e1mica externa en la aplicaci\u00f3n utilizando la variable de entorno DYLD_INSERT_LIBRARIES. Adem\u00e1s, el derecho `com.apple.security.device.camera` permite que la aplicaci\u00f3n use la c\u00e1mara del host y `com.apple.security.device.audio-input` permite que la aplicaci\u00f3n use el micr\u00f3fono. Esto significa que el c\u00f3digo no confiable que se ejecuta en la m\u00e1quina del usuario puede acceder a la c\u00e1mara o al micr\u00f3fono, si el usuario ya le dio permiso a Cursor para hacerlo. En la versi\u00f3n 0.41.0, los derechos se han dividido por proceso: el proceso principal obtiene los derechos de la c\u00e1mara y el micr\u00f3fono, pero no los derechos de DyLib, mientras que el proceso host de extensi\u00f3n obtiene los derechos de DyLib pero no los derechos de la c\u00e1mara o el micr\u00f3fono. Como workaround, no le d\u00e9 expl\u00edcitamente a Cursor el permiso para acceder a la c\u00e1mara o al micr\u00f3fono si los usuarios no confiables pueden ejecutar comandos arbitrarios en la m\u00e1quina afectada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
|
"baseScore": 3.8,
|
|
"baseSeverity": "LOW",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.0,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-277"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/getcursor/cursor/security/advisories/GHSA-x352-xv29-r74m",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |