2024-12-08 03:06:42 +00:00

60 lines
2.0 KiB
JSON

{
"id": "CVE-2024-46640",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-20T21:15:12.700",
"lastModified": "2024-09-26T13:32:55.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS 13.2 has a remote code execution vulnerability located in the file sql.class.chp. Although the system has a check function, the check function is not executed during execution, allowing remote code execution by writing to the file through the MySQL slow query method."
},
{
"lang": "es",
"value": "SeaCMS 13.2 tiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo ubicada en el archivo sql.class.chp. Aunque el sistema tiene una funci\u00f3n de verificaci\u00f3n, esta no se ejecuta durante la ejecuci\u00f3n, lo que permite la ejecuci\u00f3n remota de c\u00f3digo escribiendo en el archivo a trav\u00e9s del m\u00e9todo de consulta lenta de MySQL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://gitee.com/zheng_botong/CVE-2024-46640",
"source": "cve@mitre.org"
}
]
}