2025-01-26 03:03:52 +00:00

118 lines
4.4 KiB
JSON

{
"id": "CVE-2024-20477",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-10-02T17:15:17.130",
"lastModified": "2024-10-08T16:00:30.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface."
},
{
"lang": "es",
"value": "Una vulnerabilidad en un endpoint de API REST espec\u00edfico de Cisco NDFC podr\u00eda permitir que un atacante remoto autenticado y con pocos privilegios cargue o elimine archivos en un dispositivo afectado. Esta vulnerabilidad existe debido a la falta de controles de autorizaci\u00f3n en el endpoint de API REST afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando solicitudes de API manipuladas al endpoint afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir que el atacante cargue archivos en un contenedor espec\u00edfico o elimine archivos de una carpeta espec\u00edfica dentro de ese contenedor. Esta vulnerabilidad solo afecta a un endpoint de API REST espec\u00edfico y no afecta a la interfaz de administraci\u00f3n basada en web."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2\\(1e\\)",
"matchCriteriaId": "95C6368B-22DC-4DA0-BD68-90AD842E8D5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:nexus_dashboard_fabric_controller:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.2.2",
"matchCriteriaId": "64448F53-1135-4A69-8FBC-100258CE76BF"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN",
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}