{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5866","assignerOrgId":"e45d732a-8f6b-4b6b-be76-7420f6a2b988","state":"PUBLISHED","assignerShortName":"Kaspersky","dateReserved":"2024-06-11T15:12:47.502Z","datePublished":"2024-07-02T15:58:35.304Z","dateUpdated":"2024-08-01T21:25:03.145Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Centrify PAS","vendor":"Delinea","versions":[{"status":"affected","version":"v. 21.3"}]}],"credits":[{"lang":"en","type":"finder","value":"The vulnerability was discovered by Vladas Bulavas from Kaspersky"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Vulnerability in Delinea Centrify PAS v. 21.3 and possibly others. The application is prone to the path traversal vulnerability allowing listing of arbitrary directory outside the root directory of the web application. Versions 23.1-HF7 and on have the patch. <br>"}],"value":"Vulnerability in Delinea Centrify PAS v. 21.3 and possibly others. The application is prone to the path traversal vulnerability allowing listing of arbitrary directory outside the root directory of the web application. Versions 23.1-HF7 and on have the patch."}],"impacts":[{"capecId":"CAPEC-139","descriptions":[{"lang":"en","value":"CAPEC-139 Relative Path Traversal"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-26","description":"CWE-26: Path Traversal","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e45d732a-8f6b-4b6b-be76-7420f6a2b988","shortName":"Kaspersky","dateUpdated":"2024-07-02T15:58:35.304Z"},"references":[{"url":"https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-002.md"}],"source":{"discovery":"UNKNOWN"},"title":"Arbitrary Directory Listing in Centrify PAS","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-02T18:58:56.437338Z","id":"CVE-2024-5866","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-02T19:38:36.342Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:25:03.145Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/klsecservices/Advisories/blob/master/K-Delinea-2023-002.md","tags":["x_transferred"]}]}]}}