This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the ‘mode’ parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application.
Successful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:reedos:aim-star:2.0.1:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Wed, 11 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Reedos
Reedos aim-star |
|
CPEs | cpe:2.3:a:reedos:aim-star:*:*:*:*:*:*:*:* | |
Vendors & Products |
Reedos
Reedos aim-star |
|
Metrics |
ssvc
|
Wed, 11 Sep 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the ‘mode’ parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application. Successful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts. | |
Title | Parameter Tampering Vulnerability | |
Weaknesses | CWE-354 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: CERT-In
Published: 2024-09-11T12:00:28.464Z
Updated: 2024-09-11T13:29:41.194Z
Reserved: 2024-09-09T11:02:56.323Z
Link: CVE-2024-45789
Vulnrichment
Updated: 2024-09-11T13:29:33.912Z
NVD
Status : Analyzed
Published: 2024-09-11T12:15:02.343
Modified: 2024-09-18T19:55:58.287
Link: CVE-2024-45789
Redhat
No data.