Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication.
History

Fri, 20 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-290
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Dec 2024 16:00:00 +0000

Type Values Removed Values Added
Description Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-12-20T00:00:00

Updated: 2024-12-20T17:25:33.514Z

Reserved: 2024-12-06T00:00:00

Link: CVE-2024-55470

cve-icon Vulnrichment

Updated: 2024-12-20T17:25:24.138Z

cve-icon NVD

Status : Received

Published: 2024-12-20T16:15:23.977

Modified: 2024-12-20T18:15:30.370

Link: CVE-2024-55470

cve-icon Redhat

No data.