{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-27279","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-02-22T02:26:33.074Z","datePublished":"2024-03-12T08:19:48.705Z","dateUpdated":"2024-10-31T18:12:32.261Z"},"containers":{"cna":{"affected":[{"vendor":"appleple inc.","product":"a-blog cms Ver.3.1.x series","versions":[{"version":"Ver.3.1.9 and earlier","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.3.0.x series","versions":[{"version":"Ver.3.0.30 and earlier","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.2.11.x series","versions":[{"version":"Ver.2.11.59 and earlier","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.2.10.x series","versions":[{"version":"Ver.2.10.51 and earlier","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms","versions":[{"version":"Ver.2.9 and earlier ","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series Ver.3.1.9 and earlier, Ver.3.0.x series Ver.3.0.30 and earlier, Ver.2.11.x series Ver.2.11.59 and earlier, Ver.2.10.x series Ver.2.10.51 and earlier, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with editor or higher privilege who can login to the product may obtain arbitrary files on the server including password files."}],"problemTypes":[{"descriptions":[{"description":"Directory traversal","lang":"en","type":"text"}]}],"references":[{"url":"https://developer.a-blogcms.jp/blog/news/JVN-48443978.html"},{"url":"https://jvn.jp/en/jp/JVN48443978/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-03-12T08:19:48.705Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:27:59.741Z"},"title":"CVE Program Container","references":[{"url":"https://developer.a-blogcms.jp/blog/news/JVN-48443978.html","tags":["x_transferred"]},{"url":"https://jvn.jp/en/jp/JVN48443978/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-12T20:11:57.193866Z","id":"CVE-2024-27279","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-31T18:12:32.261Z"}}]}}