Vulnerabilites related to Interinfo - DreamMaker
CVE-2024-11978 (GCVE-0-2024-11978)
Vulnerability from cvelistv5
Published
2024-11-29 02:03
Modified
2024-12-03 06:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-36 - Absolute Path Traversal
Summary
DreamMaker from Interinfo has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8269-22a8f-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8270-a56e6-2.html | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Interinfo | DreamMaker |
Version: 0 < 2024/09/26 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:interinfo:dreammaker:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dreammaker", "vendor": "interinfo", "versions": [ { "status": "affected", "version": "0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11978", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T16:36:51.731781Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T16:37:17.441Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DreamMaker", "vendor": "Interinfo", "versions": [ { "lessThan": "2024/09/26", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-11-29T01:59:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DreamMaker from Interinfo has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files." } ], "value": "DreamMaker from Interinfo has a Path Traversal vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files." } ], "impacts": [ { "capecId": "CAPEC-597", "descriptions": [ { "lang": "en", "value": "CAPEC-597 Absolute Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-36", "description": "CWE-36 Absolute Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T06:06:38.751Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8269-22a8f-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8270-a56e6-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to version 2024/09/26 or later." } ], "value": "Update to version 2024/09/26 or later." } ], "source": { "advisory": "TVN-202411023", "discovery": "EXTERNAL" }, "title": "Interinfo DreamMaker - Arbitrary File Reading through Path Traversal", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11978", "datePublished": "2024-11-29T02:03:22.307Z", "dateReserved": "2024-11-29T01:52:15.326Z", "dateUpdated": "2024-12-03T06:06:38.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11979 (GCVE-0-2024-11979)
Vulnerability from cvelistv5
Published
2024-11-29 02:12
Modified
2024-12-03 06:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CAPEC-139 Relative Path Traversal
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
DreamMaker from Interinfo has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8271-29871-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8272-13a13-2.html | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Interinfo | DreamMaker |
Version: 0 < 2024/09/26 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:interinfo:dreammaker:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "dreammaker", "vendor": "interinfo", "versions": [ { "status": "affected", "version": "0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11979", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T14:45:24.156008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T14:47:32.893Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DreamMaker", "vendor": "Interinfo", "versions": [ { "lessThan": "2024/09/26", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-11-29T02:10:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DreamMaker from Interinfo has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells." } ], "value": "DreamMaker from Interinfo has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells." } ], "impacts": [ { "capecId": "CAPEC-650", "descriptions": [ { "lang": "en", "value": "CAPEC-650 Upload a Web Shell to a Web Server" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CAPEC-139 Relative Path Traversal", "lang": "en" } ] }, { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T06:05:57.385Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8271-29871-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8272-13a13-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to version 2024/09/26 or later." } ], "value": "Update to version 2024/09/26 or later." } ], "source": { "advisory": "TVN-202411024", "discovery": "EXTERNAL" }, "title": "Interinfo DreamMaker - Unrestricted File Upload through Path Traversal", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11979", "datePublished": "2024-11-29T02:12:14.052Z", "dateReserved": "2024-11-29T01:52:16.769Z", "dateUpdated": "2024-12-03T06:05:57.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }