Omission of user-controlled key authorization in the IDMSistemas platform, affecting the QSige product. This vulnerability allows an attacker to extract sensitive information from the API by making a request to the parameter '/qsige.locator/quotePrevious/centers/X', where X supports values 1,2,3, etc.
Fixes

Solution

Update the 'locator' module of the affected product. A patch was applied to this module on June 23, 2023. Please refer to the link ( https://web/qsige.localizador/about https://web/qsige.localizador/about ) for details. If you are using an older version, you can contact IDM to upgrade your system.


Workaround

No workaround given by the vendor.

History

Mon, 02 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-06-02T15:04:10.228Z

Reserved: 2024-01-16T08:06:10.223Z

Link: CVE-2024-0580

cve-icon Vulnrichment

Updated: 2024-08-01T18:11:35.275Z

cve-icon NVD

Status : Modified

Published: 2024-01-18T09:15:07.960

Modified: 2024-11-21T08:46:56.453

Link: CVE-2024-0580

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.