{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-52959","assignerOrgId":"256c161b-b921-402b-8c3b-c6c9c14d5d88","state":"PUBLISHED","assignerShortName":"ZUSO ART","dateReserved":"2024-11-18T08:24:35.611Z","datePublished":"2024-11-27T05:23:11.281Z","dateUpdated":"2024-11-27T14:44:37.184Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"iota C.ai Conversational Platform","vendor":"Galaxy Software Services Corporation","versions":[{"lessThanOrEqual":"2.1.3","status":"affected","version":"1.0.0","versionType":"custom"}]}],"datePublic":"2024-11-27T04:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A Improper Control of Generation of Code ('Code Injection') vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to perform arbitrary system commands via a DLL file."}],"value":"A Improper Control of Generation of Code ('Code Injection') vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to perform arbitrary system commands via a DLL file."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"256c161b-b921-402b-8c3b-c6c9c14d5d88","shortName":"ZUSO ART","dateUpdated":"2024-11-27T05:23:11.281Z"},"references":[{"tags":["third-party-advisory"],"url":"https://zuso.ai/advisory/za-2024-12"}],"source":{"defect":["ZA-2024-12"],"discovery":"UNKNOWN"},"title":"iota C.ai Conversational Platform - Improper Control of Generation of Code ('Code Injection')","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"galaxy_software_services_corporation","product":"iota_c.ai_conversational_platform","cpes":["cpe:2.3:a:galaxy_software_services_corporation:iota_c.ai_conversational_platform:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0","status":"affected","lessThanOrEqual":"2.1.3","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-27T14:41:18.867138Z","id":"CVE-2024-52959","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-27T14:44:37.184Z"}}]}}