Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-9339 | Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system. |
Fixes
Solution
Update to v4.1.12 Build 20200701 or higher.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-3847-c62ca-1.html |
|
History
Thu, 08 May 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system. | Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system. |
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-08T09:15:14.444Z
Reserved: 2020-08-07T00:00:00
Link: CVE-2020-17386
No data.
Status : Modified
Published: 2020-08-25T08:15:10.643
Modified: 2025-05-08T10:15:17.533
Link: CVE-2020-17386
No data.
OpenCVE Enrichment
No data.
EUVD