OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ovaledge
Ovaledge ovaledge |
|
Weaknesses | CWE-922 | |
CPEs | cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ovaledge
Ovaledge ovaledge |
|
Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-25T00:00:00
Updated: 2024-10-29T19:36:05.038Z
Reserved: 2022-05-09T00:00:00
Link: CVE-2022-30361
Vulnrichment
Updated: 2024-10-29T19:35:58.555Z
NVD
Status : Analyzed
Published: 2024-10-25T17:15:03.700
Modified: 2024-10-31T16:34:18.877
Link: CVE-2022-30361
Redhat
No data.