CVE-2024-1624 (GCVE-0-2024-1624)
Vulnerability from cvelistv5 – Published: 2024-03-01 15:47 – Updated: 2024-08-28 15:01
VLAI?
Title
OS Command Injection vulnerability affecting documentation server on certain Releases of 3DEXPERIENCE, SIMULIA Abaqus, SIMULIA Isight and CATIA Composer
Summary
An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution.
Severity ?
9.4 (Critical)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dassault Systèmes | Documentation server |
Affected:
Release 3DEXPERIENCE R2022x Golden , ≤ Release 3DEXPERIENCE R2022x.FP.CFA.2406
(custom)
Affected: Release 3DEXPERIENCE R2023x Golden , ≤ Release 3DEXPERIENCE R2023x FP.CFA.2350 (custom) Affected: Release 3DEXPERIENCE R2024x Golden , ≤ Release 3DEXPERIENCE R2024x.FP.CFA.2405 (custom) Affected: SIMULIA Abaqus Release 2022 Golden , ≤ SIMULIA Abaqus Release 2022.FP.CFA.2406 (custom) Affected: SIMULIA Abaqus Release 2023 Golden , ≤ SIMULIA Abaqus Release 2023.FP.CFA.2350 (custom) Affected: SIMULIA Abaqus Release 2024 Golden , ≤ SIMULIA Abaqus Release 2024.FP.CFA.2405 (custom) Affected: SIMULIA Isight Release 2022 Golden Affected: SIMULIA Isight Release 2023 Golden Affected: SIMULIA Isight Release 2024 Golden Affected: CATIA Composer Release R2023 Golden , ≤ CATIA Composer Release R2023 Refresh4 (custom) Affected: CATIA Composer Release R2024 Golden , ≤ CATIA Composer Release R2024 Refresh3 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:48:20.645Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.3ds.com/vulnerability/advisories"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:3ds:3dexperience:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "3dexperience",
"vendor": "3ds",
"versions": [
{
"lessThanOrEqual": "r2022.fp.cfa.2406",
"status": "affected",
"version": "r2022x_golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "R2023x.FP.CFA.2350",
"status": "affected",
"version": "r2023x_golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "R2024x.FP.CFA.2405",
"status": "affected",
"version": "r2024x_golden",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:3ds:simulia_abaqus:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "simulia_abaqus",
"vendor": "3ds",
"versions": [
{
"lessThanOrEqual": "2022.FP.CFA.2406",
"status": "affected",
"version": "2022_golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "2023.FP.CFA.2350",
"status": "affected",
"version": "2023_golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "2024.FP.CFA.2405",
"status": "affected",
"version": "2024_golden",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:3ds:simulia_insight:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "simulia_insight",
"vendor": "3ds",
"versions": [
{
"status": "affected",
"version": "2022_golden"
},
{
"status": "affected",
"version": "2023_golden"
},
{
"status": "affected",
"version": "2024_golden"
}
]
},
{
"cpes": [
"cpe:2.3:a:3ds:catia_composer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "catia_composer",
"vendor": "3ds",
"versions": [
{
"lessThanOrEqual": "R2023_Refresh4",
"status": "affected",
"version": "r2023_golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "R2023_Refresh3",
"status": "affected",
"version": "r2024_golden",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-1624",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:37:31.323782Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T15:01:15.090Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Documentation server",
"vendor": "Dassault Syst\u00e8mes",
"versions": [
{
"lessThanOrEqual": "Release 3DEXPERIENCE R2022x.FP.CFA.2406",
"status": "affected",
"version": "Release 3DEXPERIENCE R2022x Golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "Release 3DEXPERIENCE R2023x FP.CFA.2350",
"status": "affected",
"version": "Release 3DEXPERIENCE R2023x Golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "Release 3DEXPERIENCE R2024x.FP.CFA.2405",
"status": "affected",
"version": "Release 3DEXPERIENCE R2024x Golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "SIMULIA Abaqus Release 2022.FP.CFA.2406",
"status": "affected",
"version": "SIMULIA Abaqus Release 2022 Golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "SIMULIA Abaqus Release 2023.FP.CFA.2350",
"status": "affected",
"version": "SIMULIA Abaqus Release 2023 Golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "SIMULIA Abaqus Release 2024.FP.CFA.2405",
"status": "affected",
"version": "SIMULIA Abaqus Release 2024 Golden",
"versionType": "custom"
},
{
"status": "affected",
"version": "SIMULIA Isight Release 2022 Golden"
},
{
"status": "affected",
"version": "SIMULIA Isight Release 2023 Golden"
},
{
"status": "affected",
"version": "SIMULIA Isight Release 2024 Golden"
},
{
"lessThanOrEqual": "CATIA Composer Release R2023 Refresh4",
"status": "affected",
"version": "CATIA Composer Release R2023 Golden",
"versionType": "custom"
},
{
"lessThanOrEqual": "CATIA Composer Release R2024 Refresh3",
"status": "affected",
"version": "CATIA Composer Release R2024 Golden",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cb\u003eAn OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024\u003c/b\u003e.\u003cbr\u003eA specially crafted HTTP request can lead to arbitrary command execution."
}
],
"value": "An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-01T15:47:43.521Z",
"orgId": "f5a594e6-46a7-4e60-8a08-0a786e70e433",
"shortName": "3DS"
},
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "OS Command Injection vulnerability affecting documentation server on certain Releases of 3DEXPERIENCE, SIMULIA Abaqus, SIMULIA Isight and CATIA Composer",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "f5a594e6-46a7-4e60-8a08-0a786e70e433",
"assignerShortName": "3DS",
"cveId": "CVE-2024-1624",
"datePublished": "2024-03-01T15:47:43.521Z",
"dateReserved": "2024-02-19T12:24:17.797Z",
"dateUpdated": "2024-08-28T15:01:15.090Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-1624\",\"sourceIdentifier\":\"3DS.Information-Security@3ds.com\",\"published\":\"2024-03-01T16:15:45.723\",\"lastModified\":\"2024-11-21T08:50:56.927\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo que afecta al servidor de documentaci\u00f3n en 3DEXPERIENCE desde la versi\u00f3n 3DEXPERIENCE R2022x hasta la versi\u00f3n 3DEXPERIENCE R2024x, SIMULIA Abaqus desde la versi\u00f3n 2022 hasta la versi\u00f3n 2024, SIMULIA Isight desde la versi\u00f3n 2022 hasta la versi\u00f3n 2024 y CATIA Composer desde la versi\u00f3n R2023 hasta la versi\u00f3n R2024. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"3DS.Information-Security@3ds.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H\",\"baseScore\":9.4,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"3DS.Information-Security@3ds.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://www.3ds.com/vulnerability/advisories\",\"source\":\"3DS.Information-Security@3ds.com\"},{\"url\":\"https://www.3ds.com/vulnerability/advisories\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.3ds.com/vulnerability/advisories\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T18:48:20.645Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-1624\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-28T14:37:31.323782Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:3ds:3dexperience:*:*:*:*:*:*:*:*\"], \"vendor\": \"3ds\", \"product\": \"3dexperience\", \"versions\": [{\"status\": \"affected\", \"version\": \"r2022x_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"r2022.fp.cfa.2406\"}, {\"status\": \"affected\", \"version\": \"r2023x_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R2023x.FP.CFA.2350\"}, {\"status\": \"affected\", \"version\": \"r2024x_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R2024x.FP.CFA.2405\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:3ds:simulia_abaqus:*:*:*:*:*:*:*:*\"], \"vendor\": \"3ds\", \"product\": \"simulia_abaqus\", \"versions\": [{\"status\": \"affected\", \"version\": \"2022_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2022.FP.CFA.2406\"}, {\"status\": \"affected\", \"version\": \"2023_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2023.FP.CFA.2350\"}, {\"status\": \"affected\", \"version\": \"2024_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2024.FP.CFA.2405\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:3ds:simulia_insight:*:*:*:*:*:*:*:*\"], \"vendor\": \"3ds\", \"product\": \"simulia_insight\", \"versions\": [{\"status\": \"affected\", \"version\": \"2022_golden\"}, {\"status\": \"affected\", \"version\": \"2023_golden\"}, {\"status\": \"affected\", \"version\": \"2024_golden\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:3ds:catia_composer:*:*:*:*:*:*:*:*\"], \"vendor\": \"3ds\", \"product\": \"catia_composer\", \"versions\": [{\"status\": \"affected\", \"version\": \"r2023_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R2023_Refresh4\"}, {\"status\": \"affected\", \"version\": \"r2024_golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"R2023_Refresh3\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-28T15:00:59.338Z\"}}], \"cna\": {\"title\": \"OS Command Injection vulnerability affecting documentation server on certain Releases of 3DEXPERIENCE, SIMULIA Abaqus, SIMULIA Isight and CATIA Composer\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-88\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-88 OS Command Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Dassault Syst\\u00e8mes\", \"product\": \"Documentation server\", \"versions\": [{\"status\": \"affected\", \"version\": \"Release 3DEXPERIENCE R2022x Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"Release 3DEXPERIENCE R2022x.FP.CFA.2406\"}, {\"status\": \"affected\", \"version\": \"Release 3DEXPERIENCE R2023x Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"Release 3DEXPERIENCE R2023x FP.CFA.2350\"}, {\"status\": \"affected\", \"version\": \"Release 3DEXPERIENCE R2024x Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"Release 3DEXPERIENCE R2024x.FP.CFA.2405\"}, {\"status\": \"affected\", \"version\": \"SIMULIA Abaqus Release 2022 Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"SIMULIA Abaqus Release 2022.FP.CFA.2406\"}, {\"status\": \"affected\", \"version\": \"SIMULIA Abaqus Release 2023 Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"SIMULIA Abaqus Release 2023.FP.CFA.2350\"}, {\"status\": \"affected\", \"version\": \"SIMULIA Abaqus Release 2024 Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"SIMULIA Abaqus Release 2024.FP.CFA.2405\"}, {\"status\": \"affected\", \"version\": \"SIMULIA Isight Release 2022 Golden\"}, {\"status\": \"affected\", \"version\": \"SIMULIA Isight Release 2023 Golden\"}, {\"status\": \"affected\", \"version\": \"SIMULIA Isight Release 2024 Golden\"}, {\"status\": \"affected\", \"version\": \"CATIA Composer Release R2023 Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"CATIA Composer Release R2023 Refresh4\"}, {\"status\": \"affected\", \"version\": \"CATIA Composer Release R2024 Golden\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"CATIA Composer Release R2024 Refresh3\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.3ds.com/vulnerability/advisories\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024. A specially crafted HTTP request can lead to arbitrary command execution.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cb\u003eAn OS Command Injection vulnerability affecting documentation server on 3DEXPERIENCE from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x, SIMULIA Abaqus from Release 2022 through Release 2024, SIMULIA Isight from Release 2022 through Release 2024 and CATIA Composer from Release R2023 through Release R2024\u003c/b\u003e.\u003cbr\u003eA specially crafted HTTP request can lead to arbitrary command execution.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"f5a594e6-46a7-4e60-8a08-0a786e70e433\", \"shortName\": \"3DS\", \"dateUpdated\": \"2024-03-01T15:47:43.521Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-1624\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-28T15:01:15.090Z\", \"dateReserved\": \"2024-02-19T12:24:17.797Z\", \"assignerOrgId\": \"f5a594e6-46a7-4e60-8a08-0a786e70e433\", \"datePublished\": \"2024-03-01T15:47:43.521Z\", \"assignerShortName\": \"3DS\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…