Description
cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by a origin bypass via the host header in an HTTP request. This vulnerability can be triggered by an HTTP endpoint exposed to the network.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44298 | cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by a origin bypass via the host header in an HTTP request. This vulnerability can be triggered by an HTTP endpoint exposed to the network. |
References
| Link | Providers |
|---|---|
| https://doi.org/10.35011/ww2q-d522 |
|
| https://www.cashit.at/ |
|
History
No history.
Status: PUBLISHED
Assigner: CyberDanube
Published:
Updated: 2024-08-02T07:01:57.363Z
Reserved: 2023-07-13T07:01:28.747Z
Link: CVE-2023-3654
No data.
Status : Modified
Published: 2023-10-03T09:15:10.247
Modified: 2024-11-21T08:17:45.840
Link: CVE-2023-3654
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD