Description
Battelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the direct checking of the API key against a user-supplied value in PHP's GET global variable array using PHP's strcmp() function. By adding "[]" to the end of "key" in the URL when accessing API functions, an attacker could exploit this vulnerability to execute API functions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-1963 | Battelle V2I Hub 2.5.1 could allow a remote attacker to bypass security restrictions, caused by the direct checking of the API key against a user-supplied value in PHP's GET global variable array using PHP's strcmp() function. By adding "[]" to the end of "key" in the URL when accessing API functions, an attacker could exploit this vulnerability to execute API functions. |
References
| Link | Providers |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/147305 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:40:47.606Z
Reserved: 2018-07-27T00:00:00.000Z
Link: CVE-2018-1000628
No data.
Status : Modified
Published: 2018-12-28T16:29:01.487
Modified: 2024-11-21T03:40:16.193
Link: CVE-2018-1000628
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD