This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the ‘mode’ parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application.
Successful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:reedos:aim-star:2.0.1:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 11 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Reedos
Reedos aim-star |
|
| CPEs | cpe:2.3:a:reedos:aim-star:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Reedos
Reedos aim-star |
|
| Metrics |
ssvc
|
Wed, 11 Sep 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exists in Reedos aiM-Star version 2.0.1 due to improper validation of the ‘mode’ parameter in the API endpoint used during the registration process. An authenticated remote attacker could exploit this vulnerability by manipulating parameter in the API request body on the vulnerable application. Successful exploitation of this vulnerability could allow the attacker to bypass certain constraints in the registration process leading to creation of multiple accounts. | |
| Title | Parameter Tampering Vulnerability | |
| Weaknesses | CWE-354 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-In
Published: 2024-09-11T12:00:28.464Z
Updated: 2024-09-11T13:29:41.194Z
Reserved: 2024-09-09T11:02:56.323Z
Link: CVE-2024-45789
Updated: 2024-09-11T13:29:33.912Z
Status : Analyzed
Published: 2024-09-11T12:15:02.343
Modified: 2024-09-18T19:55:58.287
Link: CVE-2024-45789
No data.