{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6759","assignerOrgId":"63664ac6-956c-4cba-a5d0-f46076e16109","state":"PUBLISHED","assignerShortName":"freebsd","dateReserved":"2024-07-15T14:18:19.971Z","datePublished":"2024-08-11T02:45:15.024Z","dateUpdated":"2024-08-16T17:02:45.727Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","modules":["nfsclient"],"product":"FreeBSD","vendor":"FreeBSD","versions":[{"lessThan":"p3","status":"affected","version":"14.1-RELEASE","versionType":"release"},{"lessThan":"p9","status":"affected","version":"14.0-RELEASE","versionType":"release"},{"lessThan":"p5","status":"affected","version":"13.3-RELEASE","versionType":"release"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Apple Security Engineering and Architecture (SEAR)"}],"datePublic":"2024-08-07T15:00:00.000Z","descriptions":[{"lang":"en","value":"When mounting a remote filesystem using NFS, the kernel did not sanitize remotely provided filenames for the path separator character, \"/\".  This allows readdir(3) and related functions to return filesystem entries with names containing additional path components.\n\nThe lack of validation described above gives rise to a confused deputy problem.  For example, a program copying files from an NFS mount could be tricked into copying from outside the intended source directory, and/or to a location outside the intended destination directory."}],"providerMetadata":{"orgId":"63664ac6-956c-4cba-a5d0-f46076e16109","shortName":"freebsd","dateUpdated":"2024-08-11T02:45:15.024Z"},"references":[{"tags":["vendor-advisory"],"url":"https://security.freebsd.org/advisories/FreeBSD-SA-24:07.nfsclient.asc"}],"source":{"discovery":"UNKNOWN"},"title":"NFS client accepts file names containing path separators","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"affected":[{"vendor":"freebsd","product":"freebsd","cpes":["cpe:2.3:o:freebsd:freebsd:14.1:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"14.1","status":"affected","lessThan":"14.1p3","versionType":"custom"}]},{"vendor":"freebsd","product":"freebsd","cpes":["cpe:2.3:o:freebsd:freebsd:13.3:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"14.0","status":"affected","lessThan":"14.0p9","versionType":"custom"}]},{"vendor":"freebsd","product":"freebsd","cpes":["cpe:2.3:o:freebsd:freebsd:13.3:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"13.3","status":"affected","lessThan":"13.3p5","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-08-12T14:14:46.215475Z","id":"CVE-2024-6759","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-12T14:24:35.396Z"}},{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20240816-0009/"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-16T17:02:45.727Z"}}]}}