CVE-2024-8767 (GCVE-0-2024-8767)

Vulnerability from cvelistv5 – Published: 2024-09-17 08:51 – Updated: 2024-09-17 13:43
VLAI?
Summary
Sensitive data disclosure and manipulation due to unnecessary privileges assignment. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 619, Acronis Backup extension for Plesk (Linux) before build 555, Acronis Backup plugin for DirectAdmin (Linux) before build 147.
CWE
Assigner
References
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:acronis:backup_plugin_for_cpanel_\\\u0026_whm:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "backup_plugin_for_cpanel_\\\u0026_whm",
            "vendor": "acronis",
            "versions": [
              {
                "lessThan": "619",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:acronis:backup_extension_for_plesk:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "backup_extension_for_plesk",
            "vendor": "acronis",
            "versions": [
              {
                "lessThan": "555",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:acronis:backup_plugin_for_directadmin:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "backup_plugin_for_directadmin",
            "vendor": "acronis",
            "versions": [
              {
                "lessThan": "147",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8767",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-17T13:35:06.655286Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-17T13:43:37.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Acronis Backup plugin for cPanel \u0026 WHM",
          "vendor": "Acronis",
          "versions": [
            {
              "lessThan": "619",
              "status": "affected",
              "version": "unspecified",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Acronis Backup extension for Plesk",
          "vendor": "Acronis",
          "versions": [
            {
              "lessThan": "555",
              "status": "affected",
              "version": "unspecified",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "Acronis Backup plugin for DirectAdmin",
          "vendor": "Acronis",
          "versions": [
            {
              "lessThan": "147",
              "status": "affected",
              "version": "unspecified",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Sensitive data disclosure and manipulation due to unnecessary privileges assignment. The following products are affected: Acronis Backup plugin for cPanel \u0026 WHM (Linux) before build 619, Acronis Backup extension for Plesk (Linux) before build 555, Acronis Backup plugin for DirectAdmin (Linux) before build 147."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-250",
              "description": "CWE-250",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-17T08:51:28.954Z",
        "orgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175",
        "shortName": "Acronis"
      },
      "references": [
        {
          "name": "SEC-4976",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security-advisory.acronis.com/advisories/SEC-4976"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "73dc0fef-1c66-4a72-9d2d-0a0f4012c175",
    "assignerShortName": "Acronis",
    "cveId": "CVE-2024-8767",
    "datePublished": "2024-09-17T08:51:28.954Z",
    "dateReserved": "2024-09-12T20:55:33.303Z",
    "dateUpdated": "2024-09-17T13:43:37.687Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Sensitive data disclosure and manipulation due to unnecessary privileges assignment. The following products are affected: Acronis Backup plugin for cPanel \u0026 WHM (Linux) before build 619, Acronis Backup extension for Plesk (Linux) before build 555, Acronis Backup plugin for DirectAdmin (Linux) before build 147.\"}, {\"lang\": \"es\", \"value\": \"Divulgaci\\u00f3n y manipulaci\\u00f3n de datos confidenciales debido a la asignaci\\u00f3n innecesaria de privilegios. Los siguientes productos se ven afectados: complemento de Acronis Backup para cPanel y WHM (Linux) anterior a la compilaci\\u00f3n 619, extensi\\u00f3n de Acronis Backup para Plesk (Linux) anterior a la compilaci\\u00f3n 555, complemento de Acronis Backup para DirectAdmin (Linux) anterior a la compilaci\\u00f3n 147.\"}]",
      "id": "CVE-2024-8767",
      "lastModified": "2024-09-20T12:31:20.110",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"security@acronis.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.9, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.1, \"impactScore\": 6.0}]}",
      "published": "2024-09-17T09:15:03.423",
      "references": "[{\"url\": \"https://security-advisory.acronis.com/advisories/SEC-4976\", \"source\": \"security@acronis.com\"}]",
      "sourceIdentifier": "security@acronis.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security@acronis.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-250\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-8767\",\"sourceIdentifier\":\"security@acronis.com\",\"published\":\"2024-09-17T09:15:03.423\",\"lastModified\":\"2024-09-20T12:31:20.110\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sensitive data disclosure and manipulation due to unnecessary privileges assignment. The following products are affected: Acronis Backup plugin for cPanel \u0026 WHM (Linux) before build 619, Acronis Backup extension for Plesk (Linux) before build 555, Acronis Backup plugin for DirectAdmin (Linux) before build 147.\"},{\"lang\":\"es\",\"value\":\"Divulgaci\u00f3n y manipulaci\u00f3n de datos confidenciales debido a la asignaci\u00f3n innecesaria de privilegios. Los siguientes productos se ven afectados: complemento de Acronis Backup para cPanel y WHM (Linux) anterior a la compilaci\u00f3n 619, extensi\u00f3n de Acronis Backup para Plesk (Linux) anterior a la compilaci\u00f3n 555, complemento de Acronis Backup para DirectAdmin (Linux) anterior a la compilaci\u00f3n 147.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@acronis.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security@acronis.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]}],\"references\":[{\"url\":\"https://security-advisory.acronis.com/advisories/SEC-4976\",\"source\":\"security@acronis.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-8767\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-17T13:35:06.655286Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:acronis:backup_plugin_for_cpanel_\\\\\u0026_whm:*:*:*:*:*:*:*:*\"], \"vendor\": \"acronis\", \"product\": \"backup_plugin_for_cpanel_\\\\\u0026_whm\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"619\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:acronis:backup_extension_for_plesk:*:*:*:*:*:*:*:*\"], \"vendor\": \"acronis\", \"product\": \"backup_extension_for_plesk\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"555\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:acronis:backup_plugin_for_directadmin:*:*:*:*:*:*:*:*\"], \"vendor\": \"acronis\", \"product\": \"backup_plugin_for_directadmin\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"147\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-17T13:43:14.496Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 9.9, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Acronis\", \"product\": \"Acronis Backup plugin for cPanel \u0026 WHM\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"619\", \"versionType\": \"semver\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Acronis\", \"product\": \"Acronis Backup extension for Plesk\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"555\", \"versionType\": \"semver\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Acronis\", \"product\": \"Acronis Backup plugin for DirectAdmin\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"147\", \"versionType\": \"semver\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://security-advisory.acronis.com/advisories/SEC-4976\", \"name\": \"SEC-4976\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Sensitive data disclosure and manipulation due to unnecessary privileges assignment. The following products are affected: Acronis Backup plugin for cPanel \u0026 WHM (Linux) before build 619, Acronis Backup extension for Plesk (Linux) before build 555, Acronis Backup plugin for DirectAdmin (Linux) before build 147.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-250\", \"description\": \"CWE-250\"}]}], \"providerMetadata\": {\"orgId\": \"73dc0fef-1c66-4a72-9d2d-0a0f4012c175\", \"shortName\": \"Acronis\", \"dateUpdated\": \"2024-09-17T08:51:28.954Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-8767\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-17T13:43:37.687Z\", \"dateReserved\": \"2024-09-12T20:55:33.303Z\", \"assignerOrgId\": \"73dc0fef-1c66-4a72-9d2d-0a0f4012c175\", \"datePublished\": \"2024-09-17T08:51:28.954Z\", \"assignerShortName\": \"Acronis\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…