Skip to content

Commit

Permalink
1 changes (1 new | 0 updated):
Browse files Browse the repository at this point in the history
      - 1 new CVEs:  CVE-2024-12503
      - 0 updated CVEs:
  • Loading branch information
cvelistV5 Github Action committed Dec 12, 2024
1 parent 0c53b8f commit 89b5fec
Show file tree
Hide file tree
Showing 3 changed files with 177 additions and 33 deletions.
158 changes: 158 additions & 0 deletions cves/2024/12xxx/CVE-2024-12503.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,158 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-12503",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"state": "PUBLISHED",
"assignerShortName": "VulDB",
"dateReserved": "2024-12-11T13:08:25.963Z",
"datePublished": "2024-12-12T00:00:12.835Z",
"dateUpdated": "2024-12-12T00:00:12.835Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2024-12-12T00:00:12.835Z"
},
"title": "ClassCMS Model Management Page admin cross site scripting",
"problemTypes": [
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-79",
"lang": "en",
"description": "Cross Site Scripting"
}
]
},
{
"descriptions": [
{
"type": "CWE",
"cweId": "CWE-94",
"lang": "en",
"description": "Code Injection"
}
]
}
],
"affected": [
{
"vendor": "n/a",
"product": "ClassCMS",
"versions": [
{
"version": "4.8",
"status": "affected"
}
],
"modules": [
"Model Management Page"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in ClassCMS 4.8. Affected by this vulnerability is an unknown functionality of the file /index.php/admin of the component Model Management Page. The manipulation of the argument URL leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "In ClassCMS 4.8 wurde eine problematische Schwachstelle entdeckt. Es geht um eine nicht näher bekannte Funktion der Datei /index.php/admin der Komponente Model Management Page. Mittels dem Manipulieren des Arguments URL mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."
}
],
"metrics": [
{
"cvssV4_0": {
"version": "4.0",
"baseScore": 5.1,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_1": {
"version": "3.1",
"baseScore": 2.4,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
}
},
{
"cvssV3_0": {
"version": "3.0",
"baseScore": 2.4,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseSeverity": "LOW"
}
},
{
"cvssV2_0": {
"version": "2.0",
"baseScore": 3.3,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N"
}
}
],
"timeline": [
{
"time": "2024-12-11T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2024-12-11T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2024-12-11T14:13:35.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "vulbox (VulDB User)",
"type": "reporter"
}
],
"references": [
{
"url": "https://vuldb.com/?id.287875",
"name": "VDB-287875 | ClassCMS Model Management Page admin cross site scripting",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.287875",
"name": "VDB-287875 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.461085",
"name": "Submit #461085 | ClassCMS V4.8 Basic Cross Site Scripting",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/Jack-Black-13/blob/blob/main/classCMS_v4.8_model_xss.md",
"tags": [
"exploit"
]
}
]
}
}
}
10 changes: 5 additions & 5 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
"fetchTime": "2024-12-11T23:33:49.368Z",
"fetchTime": "2024-12-12T00:25:04.510Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-12497",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12497",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12497.json",
"dateUpdated": "2024-12-11T23:31:05.741Z"
"cveId": "CVE-2024-12503",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12503",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12503.json",
"dateUpdated": "2024-12-12T00:00:12.835Z"
}
],
"updated": [],
Expand Down
42 changes: 14 additions & 28 deletions cves/deltaLog.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,18 @@
[
{
"fetchTime": "2024-12-12T00:25:04.510Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-12503",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12503",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12503.json",
"dateUpdated": "2024-12-12T00:00:12.835Z"
}
],
"updated": [],
"error": []
},
{
"fetchTime": "2024-12-11T23:33:49.368Z",
"numberOfChanges": 1,
Expand Down Expand Up @@ -128148,33 +128162,5 @@
],
"updated": [],
"error": []
},
{
"fetchTime": "2024-11-11T23:43:57.050Z",
"numberOfChanges": 1,
"new": [],
"updated": [
{
"cveId": "CVE-2024-10963",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10963",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10963.json",
"dateUpdated": "2024-11-11T23:37:25.182Z"
}
],
"error": []
},
{
"fetchTime": "2024-11-11T23:36:21.972Z",
"numberOfChanges": 1,
"new": [
{
"cveId": "CVE-2024-11079",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11079",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11079.json",
"dateUpdated": "2024-11-11T23:32:55.539Z"
}
],
"updated": [],
"error": []
}
]

0 comments on commit 89b5fec

Please sign in to comment.