Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9.
History

Wed, 28 Aug 2024 21:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Tue, 20 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Upkeeper
Upkeeper upkeeper Manager
CPEs cpe:2.3:a:upkeeper:upkeeper_manager:*:*:*:*:*:*:*:*
Vendors & Products Upkeeper
Upkeeper upkeeper Manager
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Aug 2024 13:45:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in upKeeper Solutions product upKeeper Manager allows Utilizing REST's Trust in the System Resource to Obtain Sensitive Data.This issue affects upKeeper Manager: through 5.1.9.
Title Leak of organizations messages
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: upKeeper

Published: 2024-08-16T13:24:07.821Z

Updated: 2024-08-20T16:51:09.282Z

Reserved: 2024-08-02T11:37:42.270Z

Link: CVE-2024-42463

cve-icon Vulnrichment

Updated: 2024-08-20T16:51:03.705Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-16T14:15:13.650

Modified: 2024-08-28T20:38:25.227

Link: CVE-2024-42463

cve-icon Redhat

No data.