{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-28033","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-03-05T04:06:08.243Z","datePublished":"2024-03-26T09:34:07.760Z","dateUpdated":"2024-08-02T17:11:00.897Z"},"containers":{"cna":{"affected":[{"vendor":"LunarNight Laboratory","product":"WebProxy","versions":[{"version":"1.7.8","status":"affected"}]},{"vendor":"LunarNight Laboratory","product":"WebProxy","versions":[{"version":"1.7.9","status":"affected"}]}],"descriptions":[{"lang":"en","value":"OS command injection vulnerability exists in WebProxy 1.7.8 and 1.7.9, which may allow a remote unauthenticated attacker to execute an arbitrary OS command with the privilege of the running web server. Note that the developer was unreachable, therefore, users should consider stop using WebProxy 1.7.8 and 1.7.9."}],"problemTypes":[{"descriptions":[{"description":"OS command injection","lang":"en","type":"text"}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN22376992/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-03-26T09:34:07.760Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:48:47.724Z"},"title":"CVE Program Container","references":[{"url":"https://jvn.jp/en/jp/JVN22376992/","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]}],"affected":[{"vendor":"ln-lab","product":"webproxy","cpes":["cpe:2.3:a:ln-lab:webproxy:1.7.8:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.7.8","status":"affected"}]},{"vendor":"ln-lab","product":"webproxy","cpes":["cpe:2.3:a:ln-lab:webproxy:1.7.9:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.7.9","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.3,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-02T17:06:16.130736Z","id":"CVE-2024-28033","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-02T17:11:00.897Z"}}]}}