2024-07-19 20:03:15 +00:00

119 lines
4.3 KiB
JSON

{
"id": "CVE-2024-6398",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2024-07-15T09:15:02.870",
"lastModified": "2024-07-19T18:25:44.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure vulnerability in SWG in versions 12.x prior to 12.2.10 and 11.x prior to 11.2.24 allows information stored in a customizable block page to be disclosed to third-party websites due to Same Origin Policy Bypass of browsers in certain scenarios. The risk is low, because other recommended default security policies such as URL categorization and GTI are in place in most policies to block access to uncategorized/high risk websites. Any information disclosed depends on how the customers have customized the block pages."
},
{
"lang": "es",
"value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en SWG en las versiones 12.x anteriores a 12.2.10 y 11.x anteriores a 11.2.24 permite que la informaci\u00f3n almacenada en una p\u00e1gina de bloqueo personalizable se divulgue a sitios web de terceros debido a la omisi\u00f3n de la pol\u00edtica del mismo origen de los navegadores en ciertos escenarios. El riesgo es bajo, porque otras pol\u00edticas de seguridad predeterminadas recomendadas, como la categorizaci\u00f3n de URL y GTI, est\u00e1n implementadas en la mayor\u00eda de las pol\u00edticas para bloquear el acceso a sitios web sin categorizar o de alto riesgo. Cualquier informaci\u00f3n divulgada depende de c\u00f3mo los clientes hayan personalizado las p\u00e1ginas de bloqueo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "trellixpsirt@trellix.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "trellixpsirt@trellix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.0.0",
"versionEndExcluding": "11.2.24",
"matchCriteriaId": "043B932C-C0D9-4BEB-96E6-BD21ED869724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:skyhighsecurity:secure_web_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.2.10",
"matchCriteriaId": "ED7160EF-0984-47EE-94EB-A22A4D4452C0"
}
]
}
]
}
],
"references": [
{
"url": "https://thrive.trellix.com/s/article/000013694",
"source": "trellixpsirt@trellix.com",
"tags": [
"Permissions Required"
]
}
]
}