Lucene search

K
vulnrichmentUpKeeperVULNRICHMENT:CVE-2024-42464
HistoryAug 16, 2024 - 1:25 p.m.

CVE-2024-42464 Leak of user information

2024-08-1613:25:20
CWE-639
upKeeper
github.com
1
cve-2024-42464
leak of user information
authorization bypass
upkeeper manager
rest trust
sensitive data

CVSS4

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/SC:N/VI:H/SI:N/VA:L/SA:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

18.8%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST’s Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9.

CNA Affected

[
  {
    "vendor": "upKeeper Solutions",
    "product": "upKeeper Manager",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "semver",
        "lessThanOrEqual": "5.1.9"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS4

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/SC:N/VI:H/SI:N/VA:L/SA:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

18.8%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-42464