2024-12-08 03:06:42 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2024-46366",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-27T17:15:13.400",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Client-side Template Injection (CSTI) vulnerability in Webkul Krayin CRM 1.3.0 allows remote attackers to execute arbitrary client-side template code by injecting a malicious payload during the lead creation process. This can lead to privilege escalation when the payload is executed, granting the attacker elevated permissions within the CRM system."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n de plantilla del lado del cliente (CSTI) en Webkul Krayin CRM 1.3.0 permite a atacantes remotos ejecutar c\u00f3digo de plantilla arbitrario del lado del cliente mediante la inyecci\u00f3n de un payload malicioso durante el proceso de creaci\u00f3n de clientes potenciales. Esto puede provocar una escalada de privilegios cuando se ejecuta payload, lo que otorga al atacante permisos elevados dentro del sistema CRM."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Tommywarren/89cef7f876ee897a4ff40a8b71b6208e",
"source": "cve@mitre.org"
}
]
}