{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7438","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-08-02T21:22:28.219Z","datePublished":"2024-08-03T15:31:03.669Z","dateUpdated":"2024-08-10T06:26:12.241Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-08-10T06:26:12.241Z"},"title":"SimpleMachines SMF User Alert Read Status index.php resource injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-99","lang":"en","description":"CWE-99 Improper Control of Resource Identifiers"}]}],"affected":[{"vendor":"SimpleMachines","product":"SMF","versions":[{"version":"2.1.4","status":"affected"}],"modules":["User Alert Read Status Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in SimpleMachines SMF 2.1.4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php?action=profile;u=2;area=showalerts;do=read of the component User Alert Read Status Handler. The manipulation of the argument aid leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In SimpleMachines SMF 2.1.4 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /index.php?action=profile;u=2;area=showalerts;do=read der Komponente User Alert Read Status Handler. Durch Manipulieren des Arguments aid mit unbekannten Daten kann eine improper control of resource identifiers-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2024-08-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-08-02T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-08-10T08:31:06.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Fewwords (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.273523","name":"VDB-273523 | SimpleMachines SMF User Alert Read Status index.php resource injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.273523","name":"VDB-273523 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.380190","name":"Submit #380190 | SimpleMachines SMF 2.1.4 Insecure Direct Object Reference","tags":["third-party-advisory"]},{"url":"https://github.com/Fewword/Poc/blob/main/smf/smf-poc2.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"simplemachines","product":"simple_machines_forum","cpes":["cpe:2.3:a:simplemachines:simple_machines_forum:2.1.4:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2.1.4","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-07T16:07:57.411421Z","id":"CVE-2024-7438","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-07T16:10:53.933Z"}}]}}