mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
64 lines
2.5 KiB
JSON
64 lines
2.5 KiB
JSON
{
|
|
"id": "CVE-2024-3185",
|
|
"sourceIdentifier": "cve@rapid7.com",
|
|
"published": "2024-04-23T09:15:07.023",
|
|
"lastModified": "2024-11-21T09:29:06.183",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": " A key used in logging.json does not follow the least privilege principle by default and is exposed to local users in the Rapid7 Platform. This allows an attacker with local access to a machine with the logging.json file to use that key to authenticate to the platform with high privileges. This was fixed in the Rapid7 platform starting 3 April 2024 via the introduction of a restricted role and the removal of automatic API key generation on installation of an agent."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una clave utilizada en logging.json no sigue el principio de privilegio m\u00ednimo de forma predeterminada y est\u00e1 expuesta a los usuarios locales en la plataforma Rapid7. Esto permite que un atacante con acceso local a una m\u00e1quina con el archivo logging.json use esa clave para autenticarse en la plataforma con altos privilegios. Esto se solucion\u00f3 en la plataforma Rapid7 a partir del 3 de abril de 2024 mediante la introducci\u00f3n de una funci\u00f3n restringida y la eliminaci\u00f3n de la generaci\u00f3n autom\u00e1tica de claves API al instalar un agente."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cve@rapid7.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H",
|
|
"baseScore": 6.8,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.3,
|
|
"impactScore": 5.5
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cve@rapid7.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-1284"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://docs.rapid7.com/insightidr/configure-the-insight-agent-to-send-logs/",
|
|
"source": "cve@rapid7.com"
|
|
},
|
|
{
|
|
"url": "https://docs.rapid7.com/insightidr/configure-the-insight-agent-to-send-logs/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |