Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-42576 | This vulnerability exists in Shilpi Client Dashboard due to improper handling of multiple parameters in the API endpoint. An authenticated remote attacker could exploit this vulnerability by including multiple “userid” parameters in the API request body leading to unauthorized access of sensitive information belonging to other users. |
Solution
Upgrade Client Dashboard to version 9.7.0
Workaround
No workaround given by the vendor.
Thu, 10 Oct 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shilpi
Shilpi client Dashboard |
|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:shilpi:client_dashboard:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Shilpi
Shilpi client Dashboard |
|
| Metrics |
cvssV3_1
|
Fri, 04 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 04 Oct 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exists in Shilpi Client Dashboard due to improper handling of multiple parameters in the API endpoint. An authenticated remote attacker could exploit this vulnerability by including multiple “userid” parameters in the API request body leading to unauthorized access of sensitive information belonging to other users. | |
| Title | Parameter Pollution Vulnerability | |
| Weaknesses | CWE-235 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2024-10-04T14:12:59.399Z
Reserved: 2024-09-30T11:42:54.095Z
Link: CVE-2024-47651
Updated: 2024-10-04T14:12:53.785Z
Status : Analyzed
Published: 2024-10-04T12:15:12.710
Modified: 2024-10-10T21:01:39.413
Link: CVE-2024-47651
No data.
OpenCVE Enrichment
No data.
EUVD