{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-28212","assignerOrgId":"f9629fae-ca2e-4fbf-9785-3ed86476aef6","state":"PUBLISHED","assignerShortName":"naver","dateReserved":"2024-03-07T02:38:58.221Z","datePublished":"2024-03-07T04:49:37.921Z","dateUpdated":"2024-08-12T19:41:41.104Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"cweId":"CWE-502","description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"NAVER","product":"nGrinder","versions":[{"status":"unaffected","version":"3.5.9"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"nGrinder before 3.5.9 uses old version of SnakeYAML, which could allow remote attacker to execute arbitrary code via unsafe deserialization."}],"credits":[{"lang":"en","value":"Peter Stöckli of GitHub Security Lab"}],"references":[{"name":"NAVER Security Advisory","url":"https://cve.naver.com/detail/cve-2024-28212.html"}],"source":{"discovery":"EXTERNAL"},"providerMetadata":{"orgId":"f9629fae-ca2e-4fbf-9785-3ed86476aef6","shortName":"naver","dateUpdated":"2024-07-15T00:27:54.327Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:48:49.537Z"},"title":"CVE Program Container","references":[{"name":"NAVER Security Advisory","url":"https://cve.naver.com/detail/cve-2024-28212.html","tags":["x_transferred"]}]},{"affected":[{"vendor":"naver","product":"ngrinder","cpes":["cpe:2.3:a:naver:ngrinder:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.5.9","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-12T19:41:37.787067Z","id":"CVE-2024-28212","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-12T19:41:41.104Z"}}]}}