{"containers":{"cna":{"affected":[{"product":"SmarterTrack","vendor":"SmarterTools","versions":[{"lessThan":"Build 8075","status":"affected","version":"100.0.8019.x","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Wietse Boonstra (DIVD)","user":"00000000-0000-4000-9000-000000000000","type":"finder"},{"lang":"en","value":"Finn van der Knaap (DIVD)","type":"analyst"},{"lang":"en","value":"Victor Gevers (DIVD)","type":"analyst"}],"descriptions":[{"lang":"en","value":"With administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file. THis is possible in SmarterTrack v100.0.8019.14010"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b87402ff-ae37-4194-9dae-31abdbd6f217","shortName":"DIVD","dateUpdated":"2025-03-11T13:39:25.911Z"},"references":[{"tags":["x_refsource_CONFIRM","related"],"url":"https://csirt.divd.nl/DIVD-2021-00029"},{"tags":["x_refsource_CONFIRM","third-party-advisory"],"url":"https://csirt.divd.nl/CVE-2022-24387/"}],"source":{"advisory":"DIVD-2021-00029","discovery":"INTERNAL"},"title":"File upload and overwrite to app_data/Config in SmarterTrack v100.0.8019.14010","x_generator":{"engine":"Vulnogram 0.0.9"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-24387","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-23T15:40:24.373881Z"}}}],"affected":[{"cpes":["cpe:2.3:a:smartertools:smartertrack:*:*:*:*:*:*:*:*"],"vendor":"smartertools","product":"smartertrack","versions":[{"status":"affected","version":"100.0.8019.x","lessThan":"Build_8075","versionType":"custom"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:15:53.847Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T04:07:02.615Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","related","x_transferred"],"url":"https://csirt.divd.nl/DIVD-2021-00029"},{"tags":["x_refsource_CONFIRM","third-party-advisory","x_transferred"],"url":"https://csrit.divd.nl/CVE-2022-24387"}]}]},"cveMetadata":{"assignerOrgId":"b87402ff-ae37-4194-9dae-31abdbd6f217","assignerShortName":"DIVD","cveId":"CVE-2022-24387","datePublished":"2022-03-14T12:15:59.000Z","dateReserved":"2022-02-03T00:00:00.000Z","dateUpdated":"2025-03-11T13:39:25.911Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}