This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system.
History

Fri, 08 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared 63moons
63moons aero
63moons wave 2.0
CPEs cpe:2.3:a:63moons:aero:*:*:*:*:*:*:*:*
cpe:2.3:a:63moons:wave_2.0:*:*:*:*:*:*:*:*
Vendors & Products 63moons
63moons aero
63moons wave 2.0
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Mon, 04 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 Nov 2024 12:45:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system.
Title Improper Error Handling Vulnerability in Wave 2.0
Weaknesses CWE-209
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published: 2024-11-04T12:23:32.483Z

Updated: 2024-11-04T15:01:54.521Z

Reserved: 2024-10-29T12:55:06.456Z

Link: CVE-2024-51560

cve-icon Vulnrichment

Updated: 2024-11-04T15:01:50.902Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-04T13:17:05.810

Modified: 2024-11-08T15:18:23.127

Link: CVE-2024-51560

cve-icon Redhat

No data.