2025-03-09 03:03:50 +00:00

68 lines
3.0 KiB
JSON

{
"id": "CVE-2024-47053",
"sourceIdentifier": "security@mautic.org",
"published": "2025-02-26T13:15:40.090",
"lastModified": "2025-02-26T13:15:40.090",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This advisory addresses an authorization vulnerability in Mautic's HTTP Basic Authentication implementation. This flaw could allow unauthorized access to sensitive report data.\n\n * Improper Authorization:\u00a0An authorization flaw exists in Mautic's API Authorization implementation. Any authenticated user, regardless of assigned roles or permissions, can access all reports and their associated data via the API. This bypasses the intended access controls governed by the \"Reporting Permissions > View Own\" and \"Reporting Permissions > View Others\" permissions, which should restrict access to non-System Reports."
},
{
"lang": "es",
"value": "Este aviso aborda una vulnerabilidad de autorizaci\u00f3n en la implementaci\u00f3n de autenticaci\u00f3n b\u00e1sica HTTP de Mautic. Esta falla podr\u00eda permitir el acceso no autorizado a datos confidenciales de informes. * Autorizaci\u00f3n incorrecta: existe una falla de autorizaci\u00f3n en la implementaci\u00f3n de autorizaci\u00f3n de API de Mautic. Cualquier usuario autenticado, independientemente de los roles o permisos asignados, puede acceder a todos los informes y sus datos asociados a trav\u00e9s de la API. Esto omite los controles de acceso previstos regidos por los permisos \"Permisos de informes > Ver propios\" y \"Permisos de informes > Ver otros\", que deber\u00edan restringir el acceso a los informes que no sean del sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@mautic.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@mautic.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/287.html",
"source": "security@mautic.org"
},
{
"url": "https://docs.mautic.org/en/5.2/configuration/settings.html#api-settings",
"source": "security@mautic.org"
},
{
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-8xv7-g2q3-fqgc",
"source": "security@mautic.org"
}
]
}