mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
60 lines
2.6 KiB
JSON
60 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-49581",
|
|
"sourceIdentifier": "cve-coordination@palantir.com",
|
|
"published": "2024-12-02T21:15:10.830",
|
|
"lastModified": "2024-12-02T21:15:10.830",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Restricted Views backed objects (OSV1) could be bypassed under specific circumstances due to a software bug, this could have allowed users that didn't have permission to see such objects to view them via Object Explorer directly. This software bug did not impact or otherwise make data available across organizational boundaries nor did it allow for data to be viewed or accessed by unauthenticated users. \nThe affected service have been patched and automatically deployed to all Apollo-managed Foundry instances."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Restricted Views backed objects (OSV1) se puede omitir en circunstancias espec\u00edficas debido a un error de software, lo que podr\u00eda haber permitido que los usuarios que no ten\u00edan permiso para ver dichos objetos los vieran directamente a trav\u00e9s del Explorador de objetos. Este error de software no afect\u00f3 ni hizo que los datos estuvieran disponibles a trav\u00e9s de los l\u00edmites de la organizaci\u00f3n ni permiti\u00f3 que los usuarios no autenticados vieran o accedieran a los datos. El servicio afectado se ha parcheado y se ha implementado autom\u00e1ticamente en todas las instancias de Foundry administradas por Apollo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cve-coordination@palantir.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cve-coordination@palantir.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16",
|
|
"source": "cve-coordination@palantir.com"
|
|
}
|
|
]
|
|
} |