Skip to content

Commit

Permalink
1 changes (1 new | 0 updated):
Browse files Browse the repository at this point in the history
      - 1 new CVEs:  CVE-2024-13067
      - 0 updated CVEs:
  • Loading branch information
cvelistV5 Github Action committed Dec 31, 2024
1 parent d620240 commit 09c0dad
Show file tree
Hide file tree
Showing 3 changed files with 182 additions and 5 deletions.
163 changes: 163 additions & 0 deletions cves/2024/13xxx/CVE-2024-13067.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,163 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-13067",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"state": "PUBLISHED",
"assignerShortName": "VulDB",
"dateReserved": "2024-12-31T08:35:38.425Z",
"datePublished": "2024-12-31T09:00:52.751Z",
"dateUpdated": "2024-12-31T09:00:52.751Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2024-12-31T09:00:52.751Z"
},
"title": "CodeAstro Online Food Ordering System All Users Page all_users.php access control",
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-284",
"lang": "en",
"description": "Improper Access Controls"
}
]
},
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-266",
"lang": "en",
"description": "Incorrect Privilege Assignment"
}
]
}
],
"affected": [
{
"vendor": "CodeAstro",
"product": "Online Food Ordering System",
"versions": [
{
"version": "1.0",
"status": "affected"
}
],
"modules": [
"All Users Page"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "Eine kritische Schwachstelle wurde in CodeAstro Online Food Ordering System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei /admin/all_users.php der Komponente All Users Page. Mittels Manipulieren mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."
}
],
"metrics": [
{
"cvssV4_0": {
"version": "4.0",
"baseScore": 6.9,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_1": {
"version": "3.1",
"baseScore": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"baseScore": 5.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"baseScore": 5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
}
}
],
"timeline": [
{
"time": "2024-12-31T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2024-12-31T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2024-12-31T09:40:42.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "John Correche (VulDB User)",
"type": "reporter"
}
],
"references": [
{
"url": "https://vuldb.com/?id.289823",
"name": "VDB-289823 | CodeAstro Online Food Ordering System All Users Page all_users.php access control",
"tags": [
"vdb-entry"
]
},
{
"url": "https://vuldb.com/?ctiid.289823",
"name": "VDB-289823 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.472081",
"name": "Submit #472081 | CodeAstro Online Food Ordering System 1.0 Broken Access Control",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/shaturo1337/POCs/blob/main/Broken%20Access%20Control%20in%20Online%20Food%20Ordering%20System.md",
"tags": [
"exploit"
]
},
{
"url": "https://codeastro.com/",
"tags": [
"product"
]
}
]
}
}
}
10 changes: 5 additions & 5 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"fetchTime": "2024-12-31T08:46:18.876Z",
"fetchTime": "2024-12-31T09:06:31.838Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-49422",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49422",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49422.json",
"dateUpdated": "2024-12-31T08:43:13.628Z"
"cveId": "CVE-2024-13067",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13067",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13067.json",
"dateUpdated": "2024-12-31T09:00:52.751Z"
}
],
"updated": [],
Expand Down
14 changes: 14 additions & 0 deletions cves/deltaLog.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,18 @@
[
{
"fetchTime": "2024-12-31T09:06:31.838Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-13067",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13067",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13067.json",
"dateUpdated": "2024-12-31T09:00:52.751Z"
}
],
"updated": [],
"error": []
},
{
"fetchTime": "2024-12-31T08:46:18.876Z",
"numberOfChanges": 1,
Expand Down

0 comments on commit 09c0dad

Please sign in to comment.