The application suffers from a privilege escalation vulnerability. An
attacker logged in as guest can escalate his privileges by poisoning the
cookie to become administrator.
attacker logged in as guest can escalate his privileges by poisoning the
cookie to become administrator.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19782 | The application suffers from a privilege escalation vulnerability. An attacker logged in as guest can escalate his privileges by poisoning the cookie to become administrator. |
Fixes
Solution
No solution given by the vendor.
Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-08T15:41:44.543Z
Reserved: 2024-01-05T22:07:42.986Z
Link: CVE-2024-22186
Updated: 2024-08-01T22:35:34.875Z
Status : Awaiting Analysis
Published: 2024-04-18T23:15:07.310
Modified: 2024-11-21T08:55:44.987
Link: CVE-2024-22186
No data.
OpenCVE Enrichment
No data.
EUVD