Description
Enable exports of the database and associated exported information of the system via the default user role. The attacked would have to have been granted access to the system prior to the attack.
It is worth noting that the deterministic nature of the export name is lower risk as the UI for exporting would start the download at the same time, which once downloaded - deletes the export from the system.
The endpoint for exporting should simply be patched to a higher privilege level.
It is worth noting that the deterministic nature of the export name is lower risk as the UI for exporting would start the download at the same time, which once downloaded - deletes the export from the system.
The endpoint for exporting should simply be patched to a higher privilege level.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16344 | Enable exports of the database and associated exported information of the system via the default user role. The attacked would have to have been granted access to the system prior to the attack. It is worth noting that the deterministic nature of the export name is lower risk as the UI for exporting would start the download at the same time, which once downloaded - deletes the export from the system. The endpoint for exporting should simply be patched to a higher privilege level. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T18:23:28.766Z
Reserved: 2024-01-15T01:10:32.762Z
Link: CVE-2024-0551
Updated: 2024-08-01T18:11:35.064Z
Status : Awaiting Analysis
Published: 2024-02-27T14:15:27.130
Modified: 2024-11-21T08:46:51.247
Link: CVE-2024-0551
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD