fkie_cve-2024-51210
Vulnerability from fkie_nvd
Published
2024-12-04 21:15
Modified
2024-12-05 18:15
Severity ?
Summary
Firepad through 1.5.11 allows remote attackers, who have knowledge of a pad ID, to retrieve both the current text of a document and all content that has previously been pasted into the document. NOTE: in several similar products, this is the intentional behavior for anyone who knows the full document ID and corresponding URL. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "Firepad through 1.5.11 allows remote attackers, who have knowledge of a pad ID, to retrieve both the current text of a document and all content that has previously been pasted into the document. NOTE: in several similar products, this is the intentional behavior for anyone who knows the full document ID and corresponding URL. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." }, { "lang": "es", "value": "Firepad hasta la versi\u00f3n 1.5.11 permite a atacantes remotos, que tienen conocimiento de un ID de pad, recuperar tanto el texto actual de un documento como todo el contenido que se ha pegado previamente en el documento. NOTA: en varios productos similares, este es el comportamiento intencional para cualquiera que conozca el ID completo del documento y la URL correspondiente. NOTA: esta vulnerabilidad solo afecta a productos que ya no reciben soporte del fabricante." } ], "id": "CVE-2024-51210", "lastModified": "2024-12-05T18:15:22.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-12-04T21:15:24.697", "references": [ { "source": "cve@mitre.org", "url": "https://firebase.blog/posts/2013/04/announcing-firepad-our-open-source/" }, { "source": "cve@mitre.org", "url": "https://github.com/FirebaseExtended/firepad/releases/tag/v1.5.11" }, { "source": "cve@mitre.org", "url": "https://medium.com/@adityaahuja.work/accessing-full-history-of-firepad-users-ddc889e73936" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…