OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0.
Metrics
Affected Vendors & Products
References
History
Thu, 22 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Citeum
Citeum opencti |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Citeum
Citeum opencti |
Fri, 27 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Dec 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0. | |
| Title | OpenCTI leaks support information due to inadequate access control | |
| Weaknesses | CWE-200 CWE-285 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-26T21:34:48.751Z
Updated: 2024-12-27T16:19:19.600Z
Reserved: 2024-09-09T14:23:07.504Z
Link: CVE-2024-45805
Updated: 2024-12-27T16:19:15.515Z
Status : Analyzed
Published: 2024-12-26T22:15:15.083
Modified: 2025-05-22T15:51:56.137
Link: CVE-2024-45805
No data.