mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
119 lines
5.4 KiB
JSON
119 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2024-11146",
|
|
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"published": "2025-01-17T06:15:15.410",
|
|
"lastModified": "2025-02-20T20:15:45.630",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [
|
|
{
|
|
"sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"tags": [
|
|
"exclusively-hosted-service"
|
|
]
|
|
}
|
|
],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "TrueFiling is a collaborative, web-based electronic filing system where attorneys, paralegals, court reporters and self-represented filers collect public legal documentation into cases. TrueFiling is an entirely cloud-hosted application. Prior to version 3.1.112.19, TrueFiling trusted some client-controlled identifiers passed in URL requests to retrieve information. Platform users must self-register for an account, and once authenticated, could manipulate those identifiers to gain partial access to case information and the ability to partially change user access to case information. This vulnerability was addressed in version 3.1.112.19 and all instances were updated by 2024-11-08."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "TrueFiling es un sistema colaborativo de presentaci\u00f3n electr\u00f3nica basado en la web en el que abogados, asistentes jur\u00eddicos, taqu\u00edgrafos judiciales y personas que presentan documentos por cuenta propia recopilan documentaci\u00f3n legal p\u00fablica para incluirla en los casos. TrueFiling es una aplicaci\u00f3n alojada completamente en la nube. Antes de la versi\u00f3n 3.1.112.19, TrueFiling confiaba en algunos identificadores controlados por el cliente que se pasaban en las solicitudes de URL para recuperar informaci\u00f3n. Los usuarios de la plataforma deben registrarse por s\u00ed mismos para obtener una cuenta y, una vez autenticados, pueden manipular esos identificadores para obtener acceso parcial a la informaci\u00f3n del caso y la capacidad de cambiar parcialmente el acceso del usuario a la informaci\u00f3n del caso. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 3.1.112.19 y todas las instancias se actualizaron antes del 8 de noviembre de 2024."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV40": [
|
|
{
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "4.0",
|
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:D/RE:L/U:X",
|
|
"baseScore": 6.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"attackRequirements": "PRESENT",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"vulnConfidentialityImpact": "LOW",
|
|
"vulnIntegrityImpact": "LOW",
|
|
"vulnAvailabilityImpact": "LOW",
|
|
"subConfidentialityImpact": "NONE",
|
|
"subIntegrityImpact": "NONE",
|
|
"subAvailabilityImpact": "NONE",
|
|
"exploitMaturity": "NOT_DEFINED",
|
|
"confidentialityRequirement": "NOT_DEFINED",
|
|
"integrityRequirement": "NOT_DEFINED",
|
|
"availabilityRequirement": "NOT_DEFINED",
|
|
"modifiedAttackVector": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
|
"modifiedUserInteraction": "NOT_DEFINED",
|
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
|
"Safety": "NOT_DEFINED",
|
|
"Automatable": "YES",
|
|
"Recovery": "NOT_DEFINED",
|
|
"valueDensity": "DIFFUSE",
|
|
"vulnerabilityResponseEffort": "LOW",
|
|
"providerUrgency": "NOT_DEFINED"
|
|
}
|
|
}
|
|
],
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
|
"baseScore": 6.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-639"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-807"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://infosec.exchange/@abreacher",
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
|
},
|
|
{
|
|
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-25-017-01.json",
|
|
"source": "9119a7d8-5eab-497f-8521-727c672e3725"
|
|
}
|
|
]
|
|
} |