This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
63moons
63moons aero 63moons wave 2.0 |
|
CPEs | cpe:2.3:a:63moons:aero:*:*:*:*:*:*:*:* cpe:2.3:a:63moons:wave_2.0:*:*:*:*:*:*:*:* |
|
Vendors & Products |
63moons
63moons aero 63moons wave 2.0 |
|
Metrics |
cvssV3_1
|
Mon, 04 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Nov 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system. | |
Title | Improper Error Handling Vulnerability in Wave 2.0 | |
Weaknesses | CWE-209 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: CERT-In
Published: 2024-11-04T12:23:32.483Z
Updated: 2024-11-04T15:01:54.521Z
Reserved: 2024-10-29T12:55:06.456Z
Link: CVE-2024-51560
Vulnrichment
Updated: 2024-11-04T15:01:50.902Z
NVD
Status : Analyzed
Published: 2024-11-04T13:17:05.810
Modified: 2024-11-08T15:18:23.127
Link: CVE-2024-51560
Redhat
No data.