{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-23182","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-01-12T05:24:51.969Z","datePublished":"2024-01-23T09:38:58.906Z","dateUpdated":"2025-05-30T14:19:44.009Z"},"containers":{"cna":{"affected":[{"vendor":"appleple inc.","product":"a-blog cms Ver.3.1.x series","versions":[{"version":"prior to Ver.3.1.7","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.3.0.x series","versions":[{"version":"prior to Ver.3.0.29","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.2.11.x series","versions":[{"version":"prior to Ver.2.11.58","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.2.10.x series","versions":[{"version":"prior to Ver.2.10.50","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms","versions":[{"version":"Ver.2.9.0 and earlier ","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Relative path traversal vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to delete arbitrary files on the server."}],"problemTypes":[{"descriptions":[{"description":"Relative path traversal","lang":"en","type":"text"}]}],"references":[{"url":"https://developer.a-blogcms.jp/blog/news/JVN-34565930.html"},{"url":"https://jvn.jp/en/jp/JVN34565930/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-01-23T09:38:58.906Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:59:32.082Z"},"title":"CVE Program Container","references":[{"url":"https://developer.a-blogcms.jp/blog/news/JVN-34565930.html","tags":["x_transferred"]},{"url":"https://jvn.jp/en/jp/JVN34565930/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.1,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T17:35:32.973909Z","id":"CVE-2024-23182","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-30T14:19:44.009Z"}}]}}