{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-31394","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2024-04-03T02:24:22.988Z","datePublished":"2024-05-22T04:35:31.768Z","dateUpdated":"2025-03-27T15:03:43.986Z"},"containers":{"cna":{"affected":[{"vendor":"appleple inc.","product":"a-blog cms Ver.3.1.x series","versions":[{"version":"prior to Ver.3.1.12","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.3.0.x series","versions":[{"version":"prior to Ver.3.0.32","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.2.11.x series","versions":[{"version":"prior to Ver.2.11.61","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms Ver.2.10.x series","versions":[{"version":"prior to Ver.2.10.53","status":"affected"}]},{"vendor":"appleple inc.","product":"a-blog cms","versions":[{"version":"Ver.2.9 and earlier ","status":"affected"}]}],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server."}],"problemTypes":[{"descriptions":[{"description":"Directory traversal","lang":"en","type":"text"}]}],"references":[{"url":"https://developer.a-blogcms.jp/blog/news/JVN-70977403.html"},{"url":"https://jvn.jp/en/jp/JVN70977403/"}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2024-05-22T04:35:31.768Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-05-22T17:10:48.613952Z","id":"CVE-2024-31394","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-27T15:03:43.986Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:52:56.577Z"},"title":"CVE Program Container","references":[{"url":"https://developer.a-blogcms.jp/blog/news/JVN-70977403.html","tags":["x_transferred"]},{"url":"https://jvn.jp/en/jp/JVN70977403/","tags":["x_transferred"]}]}]}}