Описание
In OpenIDM through 4.0.0 before 4.5.0, the info endpoint may leak sensitive information upon a request by the "anonymous" user, as demonstrated by responses with a 200 HTTP status code and a JSON object containing IP address strings. This is related to a missing access-control check in bin/defaults/script/info/login.js.
Ссылки
- ExploitThird Party Advisory
- MitigationThird Party Advisory
- ExploitThird Party Advisory
- MitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.0.0 (включая)
Одно из
cpe:2.3:a:openidm_project:openidm:*:*:*:*:*:*:*:*
cpe:2.3:a:openidm_project:openidm:4.5.0:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00273
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
CVSS3: 6.5
github
больше 3 лет назад
In OpenIDM through 4.0.0 before 4.5.0, the info endpoint may leak sensitive information upon a request by the "anonymous" user, as demonstrated by responses with a 200 HTTP status code and a JSON object containing IP address strings. This is related to a missing access-control check in bin/defaults/script/info/login.js.
EPSS
Процентиль: 50%
0.00273
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-200