Description
An issue was discovered in Scytl sVote 2.1. Because the IP address from an X-Forwarded-For header (which can be manipulated client-side) is used for the internal application logs, an attacker can inject wrong IP addresses into these logs.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-11476 | An issue was discovered in Scytl sVote 2.1. Because the IP address from an X-Forwarded-For header (which can be manipulated client-side) is used for the internal application logs, an attacker can inject wrong IP addresses into these logs. |
References
| Link | Providers |
|---|---|
| https://suid.ch/research/CVE-2019-25023.html |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T03:00:19.173Z
Reserved: 2021-02-19T00:00:00.000Z
Link: CVE-2019-25023
No data.
Status : Modified
Published: 2021-02-27T05:15:13.317
Modified: 2024-11-21T04:39:45.840
Link: CVE-2019-25023
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD