All the vulnerabilites related to E-WEBInformationCo. - FS-EZViewer(Web)
cve-2024-4300
Vulnerability from cvelistv5
Published
2024-04-29 03:31
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-7774-fbd01-1.html | third-party-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | E-WEBInformationCo. | FS-EZViewer(Web) |
Version: earlier < |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:e-webinformationco:fs-ezviewer:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fs-ezviewer", "vendor": "e-webinformationco", "versions": [ { "lessThanOrEqual": "10.4.0.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-4300", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T13:14:57.862302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:54:29.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:53.219Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "third-party-advisory", "x_transferred" ], "url": "https://www.twcert.org.tw/tw/cp-132-7774-fbd01-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FS-EZViewer(Web)", "vendor": "E-WEBInformationCo.", "versions": [ { "lessThanOrEqual": "10.4.0.x", "status": "affected", "version": "earlier", "versionType": "custom" } ] } ], "datePublic": "2024-04-29T03:29:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents." } ], "value": "E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remote attacker can obtain the database configuration file path through the webpage source code without login. Accessing this path allows attacker to obtain the database credential with the highest privilege and database host IP address. With this information, attackers can connect to the database and perform actions such as adding, modifying, or deleting database contents." } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-29T03:31:40.592Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-7774-fbd01-1.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 10.4.1.0 or later version" } ], "value": "Update to 10.4.1.0 or later version" } ], "source": { "advisory": "\tTVN-202404011", "discovery": "EXTERNAL" }, "title": "E-WEBInformationCo. FS-EZViewer(Web) - Sensitive Data Exposure", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-4300", "datePublished": "2024-04-29T03:31:40.592Z", "dateReserved": "2024-04-29T03:22:58.923Z", "dateUpdated": "2024-08-01T20:33:53.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }