8.2
CVE-2024-11481
- EPSS 0.44%
- Veröffentlicht 29.11.2024 08:15:04
- Zuletzt bearbeitet 29.11.2024 08:15:04
- Quelle trellixpsirt@trellix.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellertrellix
≫
Produkt
enterprise_security_manager
Default Statusunknown
Version
11.6.12
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.626 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
trellixpsirt@trellix.com | 8.2 | 3.9 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.