-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
🤖 NVD update at 2025-01-02T02:56:27+0000
- Loading branch information
Showing
1 changed file
with
16 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,20 +2,24 @@ | |
"id": "CVE-2024-13061", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-12-31T12:15:22.967", | ||
"lastModified": "2024-12-31T12:15:22.967", | ||
"vulnStatus": "Received", | ||
"lastModified": "2025-01-02T02:15:19.897", | ||
"vulnStatus": "Awaiting Analysis", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "The Electronic Official Document Management System from 2100 Technology has an Authentication Bypass vulnerability. Although the product enforces an IP whitelist for the API used to query user tokens, unauthenticated remote attackers can still deceive the server to obtain tokens of arbitrary users, which can then be used to log into the system." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "Electronic Official Document Management System de 2100 Technology tiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n. Aunque el producto aplica una lista blanca de direcciones IP para la API utilizada para consultar tokens de usuarios, los atacantes remotos no autenticados a\u00fan pueden enga\u00f1ar al servidor para obtener tokens de usuarios arbitrarios, que luego pueden usarse para iniciar sesi\u00f3n en el sistema." | ||
} | ||
], | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||
|
@@ -38,7 +42,7 @@ | |
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
|
@@ -48,6 +52,14 @@ | |
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://www.chtsecurity.com/news/255984da-6630-4e25-ba9b-5ce6933935a6", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://www.chtsecurity.com/news/ade9e9af-61d0-4e3c-8aa0-e8524ee2cfbc", | ||
"source": "[email protected]" | ||
}, | ||
{ | ||
"url": "https://www.twcert.org.tw/en/cp-139-8340-d8b16-2.html", | ||
"source": "[email protected]" | ||
|