{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10372","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-24T19:51:00.848Z","datePublished":"2024-10-25T02:00:06.067Z","dateUpdated":"2024-10-25T20:46:53.609Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-25T02:00:06.067Z"},"title":"chidiwilliams buzz model_loader.py download_model temp file","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-377","lang":"en","description":"Insecure Temporary File"}]}],"affected":[{"vendor":"chidiwilliams","product":"buzz","versions":[{"version":"1.1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic was found in chidiwilliams buzz 1.1.0. This vulnerability affects the function download_model of the file buzz/model_loader.py. The manipulation leads to insecure temporary file. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In chidiwilliams buzz 1.1.0 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Hierbei betrifft es die Funktion download_model der Datei buzz/model_loader.py. Durch Beeinflussen mit unbekannten Daten kann eine insecure temporary file-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2,"vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":4.5,"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.5,"vectorString":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":3.5,"vectorString":"AV:L/AC:H/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-10-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-24T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-24T21:56:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"startr4ck (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.281764","name":"VDB-281764 | chidiwilliams buzz model_loader.py download_model temp file","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.281764","name":"VDB-281764 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.425441","name":"Submit #425441 | Github buzz 1.1.0 Insecure Temporary File in chidiwilliams / buzz","tags":["third-party-advisory"]},{"url":"https://github.com/Startr4ck/CVE_lists/blob/main/buzz/Insecure%20Temporary%20File%20in%20BUZZ.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"chidiwilliams","product":"buzz","cpes":["cpe:2.3:a:chidiwilliams:buzz:1.1.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.1.0","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-25T19:57:14.670798Z","id":"CVE-2024-10372","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-25T20:46:53.609Z"}}]}}