7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
24.3%
LedgerSMB is a free web-based double-entry accounting system. When a
LedgerSMB database administrator has an active session in /setup.pl, an
attacker can trick the admin into clicking on a link which automatically
submits a request to setup.pl without the admin’s consent. This request can
be used to create a new user account with full application (/login.pl)
privileges, leading to privilege escalation. The vulnerability is patched
in versions 1.10.30 and 1.11.9.
github.com/ledgersmb/LedgerSMB/commit/8c2ae5be68a782d62cb9c0e17c0127bf30ef4165
github.com/ledgersmb/LedgerSMB/security/advisories/GHSA-98ff-f638-qxjm
launchpad.net/bugs/cve/CVE-2024-23831
nvd.nist.gov/vuln/detail/CVE-2024-23831
security-tracker.debian.org/tracker/CVE-2024-23831
www.cve.org/CVERecord?id=CVE-2024-23831