Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vulnerability has been fixed by the AbsysNet team, by updating the mOpac binaries in versions 2.3.1 and 2.4.
Workaround
No workaround given by the vendor.
Mon, 18 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Baratz Innovacion
         Baratz Innovacion absysnet  | 
|
| CPEs | cpe:2.3:a:baratz_innovacion:absysnet:*:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Baratz Innovacion
         Baratz Innovacion absysnet  | 
|
| Metrics | 
        
        ssvc
         
  | 
Mon, 18 Nov 2024 14:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An IDOR (Insecure Direct Object Reference) vulnerability has been discovered in AbsysNet, affecting version 2.3.1. This vulnerability could allow a remote attacker to obtain the session of an unauthenticated user by brute-force attacking the session identifier on the "/cgi-bin/ocap/" endpoint. | |
| Title | IDOR vulnerability in AbsysNet | |
| Weaknesses | CWE-639 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-11-18T14:08:35.909Z
Reserved: 2024-11-18T08:05:47.290Z
Link: CVE-2024-11318
Updated: 2024-11-18T14:08:30.832Z
Status : Awaiting Analysis
Published: 2024-11-18T14:15:05.233
Modified: 2024-11-18T17:11:17.393
Link: CVE-2024-11318
No data.
                        OpenCVE Enrichment
                    No data.