{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3735","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-04-12T19:20:29.121Z","datePublished":"2024-04-13T13:00:05.571Z","dateUpdated":"2024-08-01T20:20:00.969Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-07-19T12:19:17.701Z"},"title":"Smart Office Main.aspx weak password","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-521","lang":"en","description":"CWE-521 Weak Password Requirements"}]}],"affected":[{"vendor":"n/a","product":"Smart Office","versions":[{"version":"20240405","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Smart Office up to 20240405. It has been classified as problematic. Affected is an unknown function of the file Main.aspx. The manipulation of the argument New Password/Confirm Password with the input 1 leads to weak password requirements. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-260574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Smart Office bis 20240405 ausgemacht. Betroffen hiervon ist ein unbekannter Ablauf der Datei Main.aspx. Mittels Manipulieren des Arguments New Password/Confirm Password mit der Eingabe 1 mit unbekannten Daten kann eine weak password requirements-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2024-04-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-04-12T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-04-12T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-07-19T14:21:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"ahmed8199 (VulDB User)","type":"reporter"},{"lang":"en","value":"ahmed8199 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.260574","name":"VDB-260574 | Smart Office Main.aspx weak password","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.260574","name":"VDB-260574 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.311153","name":"Submit #311153 | Smart Office - A complete HRMS Solutions https://smartofficepayroll.com/downloads 1.0 weak Password Policy allowing Account Takeover over the whole sy","tags":["third-party-advisory"]},{"url":"https://mega.nz/file/7F0BSJhD#EvnXFRviBstJGHSafvLmVWosWH2JFPAouD6ER8wnGxk","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"smartofficepayroll","product":"smartoffice","cpes":["cpe:2.3:a:smartofficepayroll:smartoffice:*:*:*:*:web:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"20240405","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-02T17:56:38.141280Z","id":"CVE-2024-3735","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-02T20:24:12.987Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:20:00.969Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.260574","name":"VDB-260574 | Smart Office Main.aspx weak password","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.260574","name":"VDB-260574 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.311153","name":"Submit #311153 | Smart Office - A complete HRMS Solutions https://smartofficepayroll.com/downloads 1.0 weak Password Policy allowing Account Takeover over the whole sy","tags":["third-party-advisory","x_transferred"]},{"url":"https://mega.nz/file/7F0BSJhD#EvnXFRviBstJGHSafvLmVWosWH2JFPAouD6ER8wnGxk","tags":["exploit","x_transferred"]}]}]}}