Description
The application suffers from a privilege escalation vulnerability. An
attacker logged in as guest can escalate his privileges by poisoning the
cookie to become administrator.
attacker logged in as guest can escalate his privileges by poisoning the
cookie to become administrator.
No analysis available yet.
Remediation
Vendor Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19782 | The application suffers from a privilege escalation vulnerability. An attacker logged in as guest can escalate his privileges by poisoning the cookie to become administrator. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-08T15:41:44.543Z
Reserved: 2024-01-05T22:07:42.986Z
Link: CVE-2024-22186
Updated: 2024-08-01T22:35:34.875Z
Status : Deferred
Published: 2024-04-18T23:15:07.310
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-22186
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD