Description
Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
No analysis available yet.
Remediation
Vendor Solution
Single Connect should be updated to the latest version provided by the vendor.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31596 | Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. |
References
| Link | Providers |
|---|---|
| https://www.usom.gov.tr/bildirim/tr-22-0093 |
|
History
Tue, 17 Sep 2024 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. | Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. |
Status: PUBLISHED
Assigner: TR-CERT
Published:
Updated: 2024-09-17T03:38:14.900Z
Reserved: 2021-12-10T00:00:00.000Z
Link: CVE-2021-44792
No data.
Status : Modified
Published: 2022-01-27T13:15:07.837
Modified: 2024-11-21T06:31:33.707
Link: CVE-2021-44792
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD