Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-57qh-vmjr-5jxg | Snipe-IT remote code execution |
Tue, 25 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1393 |
Tue, 07 Jan 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Snipeitapp
Snipeitapp snipe-it |
|
| CPEs | cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Snipeitapp
Snipeitapp snipe-it |
|
| Metrics |
cvssV3_1
|
Fri, 11 Oct 2024 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-25T15:56:20.566Z
Reserved: 2024-10-11T00:00:00.000Z
Link: CVE-2024-48987
Updated: 2024-10-11T15:00:35.083Z
Status : Analyzed
Published: 2024-10-11T13:15:16.197
Modified: 2025-05-22T17:56:50.193
Link: CVE-2024-48987
No data.
OpenCVE Enrichment
No data.
Github GHSA