CVE-2024-10749 (GCVE-0-2024-10749)
Vulnerability from cvelistv5 – Published: 2024-11-04 00:31 – Updated: 2024-11-04 18:07
VLAI?
Title
ThinkAdmin Plugs.php script deserialization
Summary
A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
CWE
- CWE-502 - Deserialization
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | ThinkAdmin |
Affected:
6.1.0
Affected: 6.1.1 Affected: 6.1.2 Affected: 6.1.3 Affected: 6.1.4 Affected: 6.1.5 Affected: 6.1.6 Affected: 6.1.7 Affected: 6.1.8 Affected: 6.1.9 Affected: 6.1.10 Affected: 6.1.11 Affected: 6.1.12 Affected: 6.1.13 Affected: 6.1.14 Affected: 6.1.15 Affected: 6.1.16 Affected: 6.1.17 Affected: 6.1.18 Affected: 6.1.19 Affected: 6.1.20 Affected: 6.1.21 Affected: 6.1.22 Affected: 6.1.23 Affected: 6.1.24 Affected: 6.1.25 Affected: 6.1.26 Affected: 6.1.27 Affected: 6.1.28 Affected: 6.1.29 Affected: 6.1.30 Affected: 6.1.31 Affected: 6.1.32 Affected: 6.1.33 Affected: 6.1.34 Affected: 6.1.35 Affected: 6.1.36 Affected: 6.1.37 Affected: 6.1.38 Affected: 6.1.39 Affected: 6.1.40 Affected: 6.1.41 Affected: 6.1.42 Affected: 6.1.43 Affected: 6.1.44 Affected: 6.1.45 Affected: 6.1.46 Affected: 6.1.47 Affected: 6.1.48 Affected: 6.1.49 Affected: 6.1.50 Affected: 6.1.51 Affected: 6.1.52 Affected: 6.1.53 Affected: 6.1.54 Affected: 6.1.55 Affected: 6.1.56 Affected: 6.1.57 Affected: 6.1.58 Affected: 6.1.59 Affected: 6.1.60 Affected: 6.1.61 Affected: 6.1.62 Affected: 6.1.63 Affected: 6.1.64 Affected: 6.1.65 Affected: 6.1.66 Affected: 6.1.67 |
Credits
p1wy (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-10749",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-04T18:07:05.264629Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-04T18:07:12.797Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "ThinkAdmin",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.1.0"
},
{
"status": "affected",
"version": "6.1.1"
},
{
"status": "affected",
"version": "6.1.2"
},
{
"status": "affected",
"version": "6.1.3"
},
{
"status": "affected",
"version": "6.1.4"
},
{
"status": "affected",
"version": "6.1.5"
},
{
"status": "affected",
"version": "6.1.6"
},
{
"status": "affected",
"version": "6.1.7"
},
{
"status": "affected",
"version": "6.1.8"
},
{
"status": "affected",
"version": "6.1.9"
},
{
"status": "affected",
"version": "6.1.10"
},
{
"status": "affected",
"version": "6.1.11"
},
{
"status": "affected",
"version": "6.1.12"
},
{
"status": "affected",
"version": "6.1.13"
},
{
"status": "affected",
"version": "6.1.14"
},
{
"status": "affected",
"version": "6.1.15"
},
{
"status": "affected",
"version": "6.1.16"
},
{
"status": "affected",
"version": "6.1.17"
},
{
"status": "affected",
"version": "6.1.18"
},
{
"status": "affected",
"version": "6.1.19"
},
{
"status": "affected",
"version": "6.1.20"
},
{
"status": "affected",
"version": "6.1.21"
},
{
"status": "affected",
"version": "6.1.22"
},
{
"status": "affected",
"version": "6.1.23"
},
{
"status": "affected",
"version": "6.1.24"
},
{
"status": "affected",
"version": "6.1.25"
},
{
"status": "affected",
"version": "6.1.26"
},
{
"status": "affected",
"version": "6.1.27"
},
{
"status": "affected",
"version": "6.1.28"
},
{
"status": "affected",
"version": "6.1.29"
},
{
"status": "affected",
"version": "6.1.30"
},
{
"status": "affected",
"version": "6.1.31"
},
{
"status": "affected",
"version": "6.1.32"
},
{
"status": "affected",
"version": "6.1.33"
},
{
"status": "affected",
"version": "6.1.34"
},
{
"status": "affected",
"version": "6.1.35"
},
{
"status": "affected",
"version": "6.1.36"
},
{
"status": "affected",
"version": "6.1.37"
},
{
"status": "affected",
"version": "6.1.38"
},
{
"status": "affected",
"version": "6.1.39"
},
{
"status": "affected",
"version": "6.1.40"
},
{
"status": "affected",
"version": "6.1.41"
},
{
"status": "affected",
"version": "6.1.42"
},
{
"status": "affected",
"version": "6.1.43"
},
{
"status": "affected",
"version": "6.1.44"
},
{
"status": "affected",
"version": "6.1.45"
},
{
"status": "affected",
"version": "6.1.46"
},
{
"status": "affected",
"version": "6.1.47"
},
{
"status": "affected",
"version": "6.1.48"
},
{
"status": "affected",
"version": "6.1.49"
},
{
"status": "affected",
"version": "6.1.50"
},
{
"status": "affected",
"version": "6.1.51"
},
{
"status": "affected",
"version": "6.1.52"
},
{
"status": "affected",
"version": "6.1.53"
},
{
"status": "affected",
"version": "6.1.54"
},
{
"status": "affected",
"version": "6.1.55"
},
{
"status": "affected",
"version": "6.1.56"
},
{
"status": "affected",
"version": "6.1.57"
},
{
"status": "affected",
"version": "6.1.58"
},
{
"status": "affected",
"version": "6.1.59"
},
{
"status": "affected",
"version": "6.1.60"
},
{
"status": "affected",
"version": "6.1.61"
},
{
"status": "affected",
"version": "6.1.62"
},
{
"status": "affected",
"version": "6.1.63"
},
{
"status": "affected",
"version": "6.1.64"
},
{
"status": "affected",
"version": "6.1.65"
},
{
"status": "affected",
"version": "6.1.66"
},
{
"status": "affected",
"version": "6.1.67"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "p1wy (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in ThinkAdmin bis 6.1.67 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion script der Datei /app/admin/controller/api/Plugs.php. Durch das Beeinflussen des Arguments uptoken mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 4.6,
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "Deserialization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-04T00:31:06.125Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-282918 | ThinkAdmin Plugs.php script deserialization",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.282918"
},
{
"name": "VDB-282918 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.282918"
},
{
"name": "Submit #432436 | https://thinkadmin.top/ ThinkAdmin v6 \u003c=v6.1.67 Remote Code Execute",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.432436"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/pwysec/Xmwcq/blob/main/1.md"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-11-03T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-11-03T01:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-11-03T07:25:11.000Z",
"value": "VulDB entry last update"
}
],
"title": "ThinkAdmin Plugs.php script deserialization"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-10749",
"datePublished": "2024-11-04T00:31:06.125Z",
"dateReserved": "2024-11-03T06:20:08.147Z",
"dateUpdated": "2024-11-04T18:07:12.797Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:thinkadmin:thinkadmin:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndIncluding\": \"6.1.67\", \"matchCriteriaId\": \"BE5A0947-30AD-4012-89BA-DEE70CBCCA1B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado una vulnerabilidad clasificada como cr\\u00edtica en ThinkAdmin hasta la versi\\u00f3n 6.1.67. El script de funci\\u00f3n del archivo /app/admin/controller/api/Plugs.php est\\u00e1 afectado. La manipulaci\\u00f3n del argumento uptoken provoca la deserializaci\\u00f3n. Es posible lanzar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\\u00f3n es dif\\u00edcil. El exploit se ha hecho p\\u00fablico y puede utilizarse. Se contact\\u00f3 al proveedor con anticipaci\\u00f3n sobre esta revelaci\\u00f3n, pero no respondi\\u00f3 de ninguna manera.\"}]",
"id": "CVE-2024-10749",
"lastModified": "2024-11-06T15:04:49.497",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 2.3, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"LOW\", \"vulnerableSystemIntegrity\": \"LOW\", \"vulnerableSystemAvailability\": \"LOW\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}], \"cvssMetricV31\": [{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"baseScore\": 5.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"cna@vuldb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:S/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2024-11-04T01:15:03.470",
"references": "[{\"url\": \"https://github.com/pwysec/Xmwcq/blob/main/1.md\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://vuldb.com/?ctiid.282918\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Permissions Required\", \"VDB Entry\"]}, {\"url\": \"https://vuldb.com/?id.282918\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://vuldb.com/?submit.432436\", \"source\": \"cna@vuldb.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"cna@vuldb.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-502\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-10749\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2024-11-04T01:15:03.470\",\"lastModified\":\"2024-11-06T15:04:49.497\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ThinkAdmin hasta la versi\u00f3n 6.1.67. El script de funci\u00f3n del archivo /app/admin/controller/api/Plugs.php est\u00e1 afectado. La manipulaci\u00f3n del argumento uptoken provoca la deserializaci\u00f3n. Es posible lanzar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotaci\u00f3n es dif\u00edcil. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":2.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":3.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:S/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thinkadmin:thinkadmin:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndIncluding\":\"6.1.67\",\"matchCriteriaId\":\"BE5A0947-30AD-4012-89BA-DEE70CBCCA1B\"}]}]}],\"references\":[{\"url\":\"https://github.com/pwysec/Xmwcq/blob/main/1.md\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://vuldb.com/?ctiid.282918\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?id.282918\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?submit.432436\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-10749\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-04T18:07:05.264629Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-04T18:07:09.343Z\"}}], \"cna\": {\"title\": \"ThinkAdmin Plugs.php script deserialization\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"p1wy (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 2.3, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 5, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 4.6, \"vectorString\": \"AV:N/AC:H/Au:S/C:P/I:P/A:P\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"ThinkAdmin\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.1.0\"}, {\"status\": \"affected\", \"version\": \"6.1.1\"}, {\"status\": \"affected\", \"version\": \"6.1.2\"}, {\"status\": \"affected\", \"version\": \"6.1.3\"}, {\"status\": \"affected\", \"version\": \"6.1.4\"}, {\"status\": \"affected\", \"version\": \"6.1.5\"}, {\"status\": \"affected\", \"version\": \"6.1.6\"}, {\"status\": \"affected\", \"version\": \"6.1.7\"}, {\"status\": \"affected\", \"version\": \"6.1.8\"}, {\"status\": \"affected\", \"version\": \"6.1.9\"}, {\"status\": \"affected\", \"version\": \"6.1.10\"}, {\"status\": \"affected\", \"version\": \"6.1.11\"}, {\"status\": \"affected\", \"version\": \"6.1.12\"}, {\"status\": \"affected\", \"version\": \"6.1.13\"}, {\"status\": \"affected\", \"version\": \"6.1.14\"}, {\"status\": \"affected\", \"version\": \"6.1.15\"}, {\"status\": \"affected\", \"version\": \"6.1.16\"}, {\"status\": \"affected\", \"version\": \"6.1.17\"}, {\"status\": \"affected\", \"version\": \"6.1.18\"}, {\"status\": \"affected\", \"version\": \"6.1.19\"}, {\"status\": \"affected\", \"version\": \"6.1.20\"}, {\"status\": \"affected\", \"version\": \"6.1.21\"}, {\"status\": \"affected\", \"version\": \"6.1.22\"}, {\"status\": \"affected\", \"version\": \"6.1.23\"}, {\"status\": \"affected\", \"version\": \"6.1.24\"}, {\"status\": \"affected\", \"version\": \"6.1.25\"}, {\"status\": \"affected\", \"version\": \"6.1.26\"}, {\"status\": \"affected\", \"version\": \"6.1.27\"}, {\"status\": \"affected\", \"version\": \"6.1.28\"}, {\"status\": \"affected\", \"version\": \"6.1.29\"}, {\"status\": \"affected\", \"version\": \"6.1.30\"}, {\"status\": \"affected\", \"version\": \"6.1.31\"}, {\"status\": \"affected\", \"version\": \"6.1.32\"}, {\"status\": \"affected\", \"version\": \"6.1.33\"}, {\"status\": \"affected\", \"version\": \"6.1.34\"}, {\"status\": \"affected\", \"version\": \"6.1.35\"}, {\"status\": \"affected\", \"version\": \"6.1.36\"}, {\"status\": \"affected\", \"version\": \"6.1.37\"}, {\"status\": \"affected\", \"version\": \"6.1.38\"}, {\"status\": \"affected\", \"version\": \"6.1.39\"}, {\"status\": \"affected\", \"version\": \"6.1.40\"}, {\"status\": \"affected\", \"version\": \"6.1.41\"}, {\"status\": \"affected\", \"version\": \"6.1.42\"}, {\"status\": \"affected\", \"version\": \"6.1.43\"}, {\"status\": \"affected\", \"version\": \"6.1.44\"}, {\"status\": \"affected\", \"version\": \"6.1.45\"}, {\"status\": \"affected\", \"version\": \"6.1.46\"}, {\"status\": \"affected\", \"version\": \"6.1.47\"}, {\"status\": \"affected\", \"version\": \"6.1.48\"}, {\"status\": \"affected\", \"version\": \"6.1.49\"}, {\"status\": \"affected\", \"version\": \"6.1.50\"}, {\"status\": \"affected\", \"version\": \"6.1.51\"}, {\"status\": \"affected\", \"version\": \"6.1.52\"}, {\"status\": \"affected\", \"version\": \"6.1.53\"}, {\"status\": \"affected\", \"version\": \"6.1.54\"}, {\"status\": \"affected\", \"version\": \"6.1.55\"}, {\"status\": \"affected\", \"version\": \"6.1.56\"}, {\"status\": \"affected\", \"version\": \"6.1.57\"}, {\"status\": \"affected\", \"version\": \"6.1.58\"}, {\"status\": \"affected\", \"version\": \"6.1.59\"}, {\"status\": \"affected\", \"version\": \"6.1.60\"}, {\"status\": \"affected\", \"version\": \"6.1.61\"}, {\"status\": \"affected\", \"version\": \"6.1.62\"}, {\"status\": \"affected\", \"version\": \"6.1.63\"}, {\"status\": \"affected\", \"version\": \"6.1.64\"}, {\"status\": \"affected\", \"version\": \"6.1.65\"}, {\"status\": \"affected\", \"version\": \"6.1.66\"}, {\"status\": \"affected\", \"version\": \"6.1.67\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-11-03T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2024-11-03T01:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2024-11-03T07:25:11.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.282918\", \"name\": \"VDB-282918 | ThinkAdmin Plugs.php script deserialization\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.282918\", \"name\": \"VDB-282918 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.432436\", \"name\": \"Submit #432436 | https://thinkadmin.top/ ThinkAdmin v6 \u003c=v6.1.67 Remote Code Execute\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/pwysec/Xmwcq/blob/main/1.md\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"}, {\"lang\": \"de\", \"value\": \"Es wurde eine Schwachstelle in ThinkAdmin bis 6.1.67 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion script der Datei /app/admin/controller/api/Plugs.php. Durch das Beeinflussen des Arguments uptoken mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \\u00fcber das Netzwerk erfolgen. Die Komplexit\\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-502\", \"description\": \"Deserialization\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2024-11-04T00:31:06.125Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-10749\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-04T18:07:12.797Z\", \"dateReserved\": \"2024-11-03T06:20:08.147Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2024-11-04T00:31:06.125Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…