GHSA-X9FG-8GX4-J4X2
Vulnerability from github – Published: 2024-06-20 18:34 – Updated: 2024-08-07 18:30
VLAI?
Details
There is a cross-site scripting vulnerability in the management UI of Absolute Secure Access prior to version 13.06. Attackers with system administrator permissions can interfere with another system administrator’s use of the management UI when the second administrator later edits the same management object. This vulnerability is distinct from CVE-2024-37349 and CVE-2024-37351. The scope is unchanged, there is no loss of confidentiality. Impact to system integrity is high, impact to system availability is none.
Severity ?
4.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2024-37348"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-06-20T17:15:52Z",
"severity": "MODERATE"
},
"details": "There is a cross-site\nscripting vulnerability in the management UI of Absolute Secure Access prior to\nversion 13.06. Attackers with system administrator permissions can interfere\nwith another system administrator\u2019s use of the management UI when the second\nadministrator later edits the same management object. This vulnerability is\ndistinct from CVE-2024-37349 and CVE-2024-37351. The scope is unchanged,\nthere is no loss of confidentiality. Impact to system integrity is high, impact\nto system availability is none.",
"id": "GHSA-x9fg-8gx4-j4x2",
"modified": "2024-08-07T18:30:40Z",
"published": "2024-06-20T18:34:09Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37348"
},
{
"type": "WEB",
"url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37348"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…