← Volver a CVEs
CVE-2024-10121
HIGH7.3
Descripcion
A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way.
Detalles CVE
Puntuacion CVSS v3.17.3
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/18/2024
Ultima modificacion10/30/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
riskengine:radar
Debilidades (CWE)
CWE-639
Referencias
https://github.com/weliveby/ForCVE/blob/main/radar%20Authentication%20bypass%20vulnerability.md(cna@vuldb.com)
https://vuldb.com/?ctiid.280913(cna@vuldb.com)
https://vuldb.com/?id.280913(cna@vuldb.com)
https://vuldb.com/?submit.420960(cna@vuldb.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.