mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-01 19:21:37 +00:00
64 lines
2.7 KiB
JSON
64 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-50344",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-10-30T16:15:04.763",
|
|
"lastModified": "2024-11-01T12:57:03.417",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. The vulnerability was fixed in version 5.11.2."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "I, Librarian es una versi\u00f3n de c\u00f3digo abierto de un SaaS de gesti\u00f3n de PDF. Los archivos complementarios solo se pueden ver en el navegador si tienen un tipo MIME incluido en la lista blanca. Lamentablemente, esta l\u00f3gica no funciona, lo que permite que se ejecuten archivos no seguros que contienen Javascript con el contexto de la aplicaci\u00f3n. Un atacante puede aprovechar esta vulnerabilidad cargando un archivo complementario que contenga un c\u00f3digo o script malicioso. Este c\u00f3digo se ejecutar\u00e1 cuando se cargue el archivo en el navegador. La vulnerabilidad se solucion\u00f3 en la versi\u00f3n 5.11.2."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
|
"baseScore": 4.6,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.1,
|
|
"impactScore": 2.5
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-80"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/mkucej/i-librarian-free/commit/a67d7949ffb02fd912ebdcf552df006b44066d78",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-c2rm-w62w-5xmj",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |