Products
upKeeper Manager
- through 5.1.9
Source
80f39f49-2521-4ee7-9e17-af5d55e8032f
Tags
CVE-2024-42464 details
Published : Aug. 16, 2024, 2:15 p.m.
Last Modified : Aug. 16, 2024, 2:15 p.m.
Last Modified : Aug. 16, 2024, 2:15 p.m.
Description
Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-639 | Authorization Bypass Through User-Controlled Key | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
References
URL | Source |
---|---|
https://support.upkeeper.se/hc/en-us/articles/15432275702044-CVE-2024-42464-Leak-of-user-Information | 80f39f49-2521-4ee7-9e17-af5d55e8032f |
This website uses the NVD API, but is not approved or certified by it.