Vulnerabilites related to Cyberdigm - DestinyECM
CVE-2024-11071 (GCVE-0-2024-11071)
Vulnerability from cvelistv5
Published
2025-04-07 06:02
Modified
2025-04-15 00:53
Severity ?
7.7 (High) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
Summary
Permissive Cross-domain Policy with Untrusted Domains vulnerability in local API server of DestinyECM solution(versions described below) which is developed and maintained by Cyberdigm may allow Cross-Site Request Forgery (CSRF) attack, which probabilistically enables JSON Hijacking (aka JavaScript Hijacking) via forgery web page.* Due to product customization, version information may differ from the following version description. For further inquiries, please contact the vendor.
References
▼ | URL | Tags |
---|---|---|
https://cyberdigm.co.kr/destinyEcm |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cyberdigm | DestinyECM |
Version: 5.24.10.* < 5.24.10.2303 Version: 5.23.10.* < 5.23.12.2450 Version: 5.23.02.* < 5.23.08.2451 Version: 5.22.* < 5.22.12.2446 Version: 5.21.*, 5.20.*, 5.19.* < 5.21.12.2303 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11071", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T19:34:56.246906Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T19:35:11.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Local API Server" ], "platforms": [ "Windows" ], "product": "DestinyECM", "vendor": "Cyberdigm", "versions": [ { "changes": [ { "at": "5.24.12.2303", "status": "unaffected" } ], "lessThan": "5.24.10.2303", "status": "affected", "version": "5.24.10.*", "versionType": "custom" }, { "changes": [ { "at": "5.23.12.2450", "status": "unaffected" } ], "lessThan": "5.23.12.2450", "status": "affected", "version": "5.23.10.*", "versionType": "custom" }, { "changes": [ { "at": "5.23.08.2451", "status": "unaffected" } ], "lessThan": "5.23.08.2451", "status": "affected", "version": "5.23.02.*", "versionType": "custom" }, { "changes": [ { "at": "5.22.12.2446", "status": "unaffected" } ], "lessThan": "5.22.12.2446", "status": "affected", "version": "5.22.*", "versionType": "custom" }, { "changes": [ { "at": "5.21.12.2303", "status": "unaffected" } ], "lessThan": "5.21.12.2303", "status": "affected", "version": "5.21.*, 5.20.*, 5.19.*", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "jskimpwn(\uae40\uc9c0\uc12d, Jisub Kim)" }, { "lang": "en", "type": "finder", "value": "arang(\uc720\uc7ac\uc6b1, Jaewook You)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permissive Cross-domain Policy with Untrusted Domains vulnerability in local API server of DestinyECM solution(versions described below) which is developed and maintained by\u0026nbsp;Cyberdigm may allow Cross-Site Request Forgery (CSRF) attack, which probabilistically enables JSON Hijacking (aka JavaScript Hijacking) via forgery web page.\u003cp\u003e* Due to product customization, version information may differ from the following version description. For further inquiries, please contact the vendor.\u003c/p\u003e" } ], "value": "Permissive Cross-domain Policy with Untrusted Domains vulnerability in local API server of DestinyECM solution(versions described below) which is developed and maintained by\u00a0Cyberdigm may allow Cross-Site Request Forgery (CSRF) attack, which probabilistically enables JSON Hijacking (aka JavaScript Hijacking) via forgery web page.* Due to product customization, version information may differ from the following version description. For further inquiries, please contact the vendor." } ], "impacts": [ { "capecId": "CAPEC-111", "descriptions": [ { "lang": "en", "value": "CAPEC-111 JSON Hijacking (aka JavaScript Hijacking)" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 7.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-942", "description": "CWE-942 Permissive Cross-domain Policy with Untrusted Domains", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-15T00:53:10.622Z", "orgId": "09832df1-09c1-45b4-8a85-16c601d30feb", "shortName": "FSI" }, "references": [ { "url": "https://cyberdigm.co.kr/destinyEcm" } ], "source": { "discovery": "INTERNAL" }, "title": "Improper Access Control In DestinyECM", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "09832df1-09c1-45b4-8a85-16c601d30feb", "assignerShortName": "FSI", "cveId": "CVE-2024-11071", "datePublished": "2025-04-07T06:02:06.218Z", "dateReserved": "2024-11-11T08:07:36.256Z", "dateUpdated": "2025-04-15T00:53:10.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }