-
Notifications
You must be signed in to change notification settings - Fork 206
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 2 new CVEs: CVE-2024-11652, CVE-2024-53930 - 1 updated CVEs: CVE-2024-5514
- Loading branch information
cvelistV5 Github Action
committed
Nov 25, 2024
1 parent
b66a5f3
commit a96d24d
Showing
5 changed files
with
309 additions
and
60 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,175 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2024-11652", | ||
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "VulDB", | ||
"dateReserved": "2024-11-24T15:13:51.901Z", | ||
"datePublished": "2024-11-25T03:00:34.348Z", | ||
"dateUpdated": "2024-11-25T03:00:34.348Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"shortName": "VulDB", | ||
"dateUpdated": "2024-11-25T03:00:34.348Z" | ||
}, | ||
"title": "EnGenius ENH1350EXT/ENS500-AC/ENS620EXT sn_https command injection", | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "CWE", | ||
"cweId": "CWE-77", | ||
"lang": "en", | ||
"description": "Command Injection" | ||
} | ||
] | ||
}, | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "CWE", | ||
"cweId": "CWE-74", | ||
"lang": "en", | ||
"description": "Injection" | ||
} | ||
] | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "EnGenius", | ||
"product": "ENH1350EXT", | ||
"versions": [ | ||
{ | ||
"version": "20241118", | ||
"status": "affected" | ||
} | ||
] | ||
}, | ||
{ | ||
"vendor": "EnGenius", | ||
"product": "ENS500-AC", | ||
"versions": [ | ||
{ | ||
"version": "20241118", | ||
"status": "affected" | ||
} | ||
] | ||
}, | ||
{ | ||
"vendor": "EnGenius", | ||
"product": "ENS620EXT", | ||
"versions": [ | ||
{ | ||
"version": "20241118", | ||
"status": "affected" | ||
} | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sn_package/sn_https. The manipulation of the argument https_enable leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." | ||
}, | ||
{ | ||
"lang": "de", | ||
"value": "In EnGenius ENH1350EXT, ENS500-AC and ENS620EXT bis 20241118 wurde eine kritische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /admin/sn_package/sn_https. Mittels Manipulieren des Arguments https_enable mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung." | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"cvssV4_0": { | ||
"version": "4.0", | ||
"baseScore": 5.1, | ||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", | ||
"baseSeverity": "MEDIUM" | ||
} | ||
}, | ||
{ | ||
"cvssV3_1": { | ||
"version": "3.1", | ||
"baseScore": 4.7, | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", | ||
"baseSeverity": "MEDIUM" | ||
} | ||
}, | ||
{ | ||
"cvssV3_0": { | ||
"version": "3.0", | ||
"baseScore": 4.7, | ||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", | ||
"baseSeverity": "MEDIUM" | ||
} | ||
}, | ||
{ | ||
"cvssV2_0": { | ||
"version": "2.0", | ||
"baseScore": 5.8, | ||
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P" | ||
} | ||
} | ||
], | ||
"timeline": [ | ||
{ | ||
"time": "2024-11-24T00:00:00.000Z", | ||
"lang": "en", | ||
"value": "Advisory disclosed" | ||
}, | ||
{ | ||
"time": "2024-11-24T01:00:00.000Z", | ||
"lang": "en", | ||
"value": "VulDB entry created" | ||
}, | ||
{ | ||
"time": "2024-11-24T16:19:21.000Z", | ||
"lang": "en", | ||
"value": "VulDB entry last update" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"value": "liutong (VulDB User)", | ||
"type": "reporter" | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://vuldb.com/?id.285973", | ||
"name": "VDB-285973 | EnGenius ENH1350EXT/ENS500-AC/ENS620EXT sn_https command injection", | ||
"tags": [ | ||
"vdb-entry", | ||
"technical-description" | ||
] | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?ctiid.285973", | ||
"name": "VDB-285973 | CTI Indicators (IOB, IOC, TTP, IOA)", | ||
"tags": [ | ||
"signature", | ||
"permissions-required" | ||
] | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?submit.446629", | ||
"name": "Submit #446629 | EnGenius ENS500-AC 3.7.20 Command Injection", | ||
"tags": [ | ||
"third-party-advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://k9u7kv33ub.feishu.cn/wiki/Rf7wwXMpQiJkp8kp4pmcZb2tnPe", | ||
"tags": [ | ||
"exploit" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"cveMetadata": { | ||
"state": "PUBLISHED", | ||
"cveId": "CVE-2024-53930", | ||
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"assignerShortName": "mitre", | ||
"dateUpdated": "2024-11-25T02:59:39.568008", | ||
"dateReserved": "2024-11-25T00:00:00", | ||
"datePublished": "2024-11-25T00:00:00" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", | ||
"shortName": "mitre", | ||
"dateUpdated": "2024-11-25T02:59:39.568008" | ||
}, | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "WikiDocs before 1.0.65 allows stored XSS by authenticated users via data that comes after $$\\\\, which is mishandled by a KaTeX parser." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "n/a", | ||
"product": "n/a", | ||
"versions": [ | ||
{ | ||
"version": "n/a", | ||
"status": "affected" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://github.com/Zavy86/WikiDocs/releases/tag/1.0.65" | ||
}, | ||
{ | ||
"url": "https://github.com/Zavy86/WikiDocs/compare/1.0.64...1.0.65" | ||
}, | ||
{ | ||
"url": "https://github.com/Zavy86/WikiDocs/commit/aa264bd046a254522da67600be73791bd4e5dafc" | ||
}, | ||
{ | ||
"url": "https://github.com/Zavy86/WikiDocs/issues/211" | ||
}, | ||
{ | ||
"url": "https://github.com/Zavy86/WikiDocs/pull/213" | ||
}, | ||
{ | ||
"url": "https://www.xbow.com" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"type": "text", | ||
"lang": "en", | ||
"description": "n/a" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
}, | ||
"dataVersion": "5.1" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.