Description
Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system.
No analysis available yet.
Remediation
Vendor Solution
Update to v4.1.12 Build 20200701 or higher.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-9339 | Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-3847-c62ca-1.html |
|
History
Thu, 08 May 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system. | Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system. |
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-08T09:15:14.444Z
Reserved: 2020-08-07T00:00:00.000Z
Link: CVE-2020-17386
No data.
Status : Modified
Published: 2020-08-25T08:15:10.643
Modified: 2025-05-08T10:15:17.533
Link: CVE-2020-17386
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD