{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-11481","assignerOrgId":"01626437-bf8f-4d1c-912a-893b5eb04808","state":"PUBLISHED","assignerShortName":"trellix","dateReserved":"2024-11-20T05:15:58.706Z","datePublished":"2024-11-29T07:01:44.562Z","dateUpdated":"2024-11-29T13:55:59.611Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Trellix Enterprise Security Manager (ESM)","vendor":"Trellix","versions":[{"status":"affected","version":"11.6.12"}]}],"credits":[{"lang":"en","type":"reporter","value":"Rafal Gill"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints. </span>\n\n<br>"}],"value":"A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints."}],"impacts":[{"capecId":"CAPEC-126","descriptions":[{"lang":"en","value":"CAPEC-126 Path Traversal"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"01626437-bf8f-4d1c-912a-893b5eb04808","shortName":"trellix","dateUpdated":"2024-11-29T07:01:44.562Z"},"references":[{"url":"https://thrive.trellix.com/s/article/000014058"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"trellix","product":"enterprise_security_manager","cpes":["cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"11.6.12","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-29T13:54:04.500847Z","id":"CVE-2024-11481","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-29T13:55:59.611Z"}}]}}