Логотип exploitDog
bind:CVE-2025-69203
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-69203

Количество 2

Количество 2

nvd логотип

CVE-2025-69203

около 1 месяца назад

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the access request system have two related features that when combined by themselves and with an information disclosure vulnerability enable convincing social engineering attacks against administrators. When a device creates an access request, it specifies three fields: `clientId`, `description`, and `permissions`. The SignalK admin UI displays the `description` field prominently to the administrator when showing pending requests, but the actual `permissions` field (which determines the access level granted) is less visible or displayed separately. This allows an attacker to request `admin` permissions while providing a description that suggests readonly access. The access request handler trusts the `X-Forwarded-For` HTTP header without validation to determine the client's IP address. This header is intended to preserve the original client IP when requests pass through reverse prox

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-vfrf-vcj7-wvr8

около 1 месяца назад

Signal K Server Vulnerable to Access Request Spoofing

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-69203

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 of the access request system have two related features that when combined by themselves and with an information disclosure vulnerability enable convincing social engineering attacks against administrators. When a device creates an access request, it specifies three fields: `clientId`, `description`, and `permissions`. The SignalK admin UI displays the `description` field prominently to the administrator when showing pending requests, but the actual `permissions` field (which determines the access level granted) is less visible or displayed separately. This allows an attacker to request `admin` permissions while providing a description that suggests readonly access. The access request handler trusts the `X-Forwarded-For` HTTP header without validation to determine the client's IP address. This header is intended to preserve the original client IP when requests pass through reverse prox

CVSS3: 6.3
0%
Низкий
около 1 месяца назад
github логотип
GHSA-vfrf-vcj7-wvr8

Signal K Server Vulnerable to Access Request Spoofing

CVSS3: 6.3
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу