Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-290 | |
Metrics |
cvssV3_1
|
Fri, 20 Dec 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-12-20T00:00:00
Updated: 2024-12-20T17:25:33.514Z
Reserved: 2024-12-06T00:00:00
Link: CVE-2024-55470
Vulnrichment
Updated: 2024-12-20T17:25:24.138Z
NVD
Status : Received
Published: 2024-12-20T16:15:23.977
Modified: 2024-12-20T18:15:30.370
Link: CVE-2024-55470
Redhat
No data.