2024-12-08 03:06:42 +00:00

68 lines
3.1 KiB
JSON

{
"id": "CVE-2024-45601",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-18T18:15:06.473",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mesop is a Python-based UI framework designed for rapid web apps development. A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability was related to insufficient input validation in a specific endpoint. This could have allowed an attacker to access files not intended to be served. Users are strongly advised to update to the latest version of Mesop immediately. The latest version includes a fix for this vulnerability. At time of publication 0.12.4 is the most recently available version of Mesop."
},
{
"lang": "es",
"value": "Mesop es un framework de interfaz de usuario basado en Python dise\u00f1ado para el desarrollo r\u00e1pido de aplicaciones web. Se ha descubierto y corregido una vulnerabilidad en Mesop que podr\u00eda permitir el acceso no autorizado a los archivos del servidor que aloja la aplicaci\u00f3n Mesop. La vulnerabilidad estaba relacionada con una validaci\u00f3n de entrada insuficiente en un endpoint espec\u00edfico. Esto podr\u00eda haber permitido a un atacante acceder a archivos que no estaban destinados a ser entregados. Se recomienda encarecidamente a los usuarios que actualicen a la \u00faltima versi\u00f3n de Mesop de inmediato. La \u00faltima versi\u00f3n incluye una correcci\u00f3n para esta vulnerabilidad. En el momento de la publicaci\u00f3n, la versi\u00f3n 0.12.4 es la versi\u00f3n m\u00e1s reciente disponible de Mesop."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/google/mesop/commit/17fb769d6a91f0a8cbccfab18f64977b158a6a31",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/google/mesop/security/advisories/GHSA-pmv9-3xqp-8w42",
"source": "security-advisories@github.com"
}
]
}