2024-07-14 02:06:08 +00:00

29 lines
1.5 KiB
JSON

{
"id": "CVE-2024-27279",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-12T09:15:10.070",
"lastModified": "2024-03-12T12:40:13.500",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Directory traversal en a-blog cms Serie Ver.3.1.x Ver.3.1.9 y anteriores, Serie Ver.3.0.x Ver.3.0.30 y anteriores, Serie Ver.2.11.x Ver.2.11.59 y anteriores, Serie Ver.2.10.x Ver.2.10.51 y anteriores, y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con privilegios de editor o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor, incluidos archivos de contrase\u00f1as."
}
],
"metrics": {},
"references": [
{
"url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN48443978/",
"source": "vultures@jpcert.or.jp"
}
]
}