Vulnerabilites related to Journyx - Journyx (jtime)
CVE-2024-6892 (GCVE-0-2024-6892)
Vulnerability from cvelistv5
Published
2024-08-07 23:19
Modified
2024-08-09 15:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-81 - Improper Neutralization of Script in an Error Message Web Page
Summary
Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Journyx | Journyx (jtime) |
Version: 11.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:16.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Aug/7" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "journyx", "vendor": "journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-6892", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T15:28:34.870190Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T15:29:23.033Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Journyx (jtime)", "vendor": "Journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jaggar Henry of KoreLogic, Inc." } ], "datePublic": "2024-08-07T23:16:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eAttackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-81", "description": "CWE-81 Improper Neutralization of Script in an Error Message Web Page", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T23:19:00.527Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-009.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Journyx Reflected Cross Site Scripting", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2024-6892", "datePublished": "2024-08-07T23:19:00.527Z", "dateReserved": "2024-07-18T19:25:50.756Z", "dateUpdated": "2024-08-09T15:29:23.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6890 (GCVE-0-2024-6890)
Vulnerability from cvelistv5
Published
2024-08-07 23:09
Modified
2024-08-08 13:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Journyx | Journyx (jtime) |
Version: 11.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:14.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Aug/5" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "journyx", "vendor": "journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-6890", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:26:38.452163Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:28:52.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Journyx (jtime)", "vendor": "Journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jaggar Henry of KoreLogic, Inc." } ], "datePublic": "2024-08-07T23:05:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003ePassword reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321 Use of Hard-coded Cryptographic Key", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-334", "description": "CWE-334 Small Space of Random Values", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-799", "description": "CWE-799 Improper Control of Interaction Frequency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T23:15:35.997Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-007.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Journyx Unauthenticated Password Reset Bruteforce", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2024-6890", "datePublished": "2024-08-07T23:09:40.249Z", "dateReserved": "2024-07-18T19:25:47.090Z", "dateUpdated": "2024-08-08T13:28:52.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6893 (GCVE-0-2024-6893)
Vulnerability from cvelistv5
Published
2024-08-07 23:22
Modified
2024-08-08 13:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference
Summary
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Journyx | Journyx (jtime) |
Version: 11.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:17.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Aug/8" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "journyx", "vendor": "journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-6893", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:07:04.749717Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:14:39.692Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Journyx (jtime)", "vendor": "Journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jaggar Henry of KoreLogic, Inc." } ], "datePublic": "2024-08-07T23:20:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eThe \"soap_cgi.pyc\" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "The \"soap_cgi.pyc\" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "CWE-611 Improper Restriction of XML External Entity Reference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T23:22:08.667Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-010.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Journyx Unauthenticated XML External Entities Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2024-6893", "datePublished": "2024-08-07T23:22:08.667Z", "dateReserved": "2024-07-18T19:25:52.422Z", "dateUpdated": "2024-08-08T13:14:39.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-6891 (GCVE-0-2024-6891)
Vulnerability from cvelistv5
Published
2024-08-07 23:13
Modified
2024-08-08 13:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Attackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Journyx | Journyx (jtime) |
Version: 11.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:29:15.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Aug/6" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "journyx", "vendor": "journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-6891", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:36:54.539352Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:41:15.752Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Journyx (jtime)", "vendor": "Journyx", "versions": [ { "status": "affected", "version": "11.5.4" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jaggar Henry of KoreLogic, Inc." } ], "datePublic": "2024-08-07T23:11:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eAttackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Attackers with a valid username and password can exploit a python code injection vulnerability during the natural login flow." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-07T23:13:56.924Z", "orgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "shortName": "KoreLogic" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-008.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Journyx Authenticated Remote Code Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "assignerShortName": "KoreLogic", "cveId": "CVE-2024-6891", "datePublished": "2024-08-07T23:13:56.924Z", "dateReserved": "2024-07-18T19:25:49.024Z", "dateUpdated": "2024-08-08T13:41:15.752Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }