2024-12-08 03:06:42 +00:00

64 lines
2.2 KiB
JSON

{
"id": "CVE-2024-29863",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T07:15:11.110",
"lastModified": "2024-11-21T09:08:29.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition in the installer executable in Qlik Qlikview before versions May 2022 SR3 (12.70.20300) and May 2023 SR2 (12,80.20200) may allow an existing lower privileged user to cause code to be executed in the context of a Windows Administrator."
},
{
"lang": "es",
"value": "Una condici\u00f3n de ejecuci\u00f3n en instalador ejecutable en Qlik Qlikview anterior a las versiones SR3 de mayo de 2022 (12.70.20300) y SR2 de mayo de 2023 (12,80.20200) puede permitir que un usuario existente con privilegios inferiores haga que el c\u00f3digo se ejecute en el contexto de un administrador de Windows."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fix-for-QlikView-CVE-2024-29863/ta-p/2432661",
"source": "cve@mitre.org"
},
{
"url": "https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fix-for-QlikView-CVE-2024-29863/ta-p/2432661",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}