Description
Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values.
Published: 2024-10-11
Score: 6.6 Medium
EPSS: 2.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-57qh-vmjr-5jxg Snipe-IT remote code execution
History

Tue, 25 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1393

Tue, 07 Jan 2025 16:00:00 +0000


Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Snipeitapp
Snipeitapp snipe-it
CPEs cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
Vendors & Products Snipeitapp
Snipeitapp snipe-it
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 11 Oct 2024 04:45:00 +0000

Type Values Removed Values Added
Description Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values.
References

Subscriptions

Snipeitapp Snipe-it
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-25T15:56:20.566Z

Reserved: 2024-10-11T00:00:00.000Z

Link: CVE-2024-48987

cve-icon Vulnrichment

Updated: 2024-10-11T15:00:35.083Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-11T13:15:16.197

Modified: 2025-05-22T17:56:50.193

Link: CVE-2024-48987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses