This vulnerability exists in Reedos aiM-Star version 2.0.1 due to transmission of sensitive information in plain text in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating a parameter through API request URL and intercepting response of the API request leading to exposure of sensitive information belonging to other users.
History

Wed, 18 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:reedos:aim-star:2.0.1:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 11 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Reedos
Reedos aim-star
CPEs cpe:2.3:a:reedos:aim-star:*:*:*:*:*:*:*:*
Vendors & Products Reedos
Reedos aim-star
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 12:00:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in Reedos aiM-Star version 2.0.1 due to transmission of sensitive information in plain text in certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating a parameter through API request URL and intercepting response of the API request leading to exposure of sensitive information belonging to other users.
Title Information Disclosure Vulnerability
Weaknesses CWE-359
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published: 2024-09-11T11:53:03.596Z

Updated: 2024-09-11T13:32:13.850Z

Reserved: 2024-09-09T11:02:56.323Z

Link: CVE-2024-45787

cve-icon Vulnrichment

Updated: 2024-09-11T13:32:08.295Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-11T12:15:02.123

Modified: 2024-09-18T18:15:07.650

Link: CVE-2024-45787

cve-icon Redhat

No data.