{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T21:38:13.499","vulnerabilities":[{"cve":{"id":"CVE-2024-49357","sourceIdentifier":"security-advisories@github.com","published":"2024-10-24T22:15:03.880","lastModified":"2025-09-22T14:21:51.990","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoints in ZimaOS, such as `http://<Server-IP>/v1/users/image?path=/var/lib/casaos/1/app_order.json` and `http://<Server-IP>/v1/users/image?path=/var/lib/casaos/1/system.json`, expose sensitive data like installed applications and system information without requiring any authentication or authorization. This sensitive data leak can be exploited by attackers to gain detailed knowledge about the system setup, installed applications, and other critical information. As of time of publication, no known patched versions are available."},{"lang":"es","value":"ZimaOS es una bifurcación de CasaOS, un sistema operativo para dispositivos Zima y sistemas x86-64 con UEFI. En la versión 1.2.4 y todas las versiones anteriores, los endpoints de API en ZimaOS, como `http:///v1/users/image?path=/var/lib/casaos/1/app_order.json` y `http:///v1/users/image?path=/var/lib/casaos/1/system.json`, exponen datos confidenciales como aplicaciones instaladas e información del sistema sin requerir ninguna autenticación o autorización. Los atacantes pueden aprovechar esta fuga de datos confidenciales para obtener conocimiento detallado sobre la configuración del sistema, las aplicaciones instaladas y otra información crítica. Al momento de la publicación, no hay versiones parcheadas conocidas disponibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:zimaspace:zimaos:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.5","matchCriteriaId":"87886C14-3294-4D0F-A698-037E94723CC5"}]}]}],"references":[{"url":"https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-hg2h-q5h6-r5c4","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://youtu.be/H_WoqzM-9Cc","source":"security-advisories@github.com","tags":["Exploit"]}]}}]}