The 1E Platform's component utilized the third-party Duende Identity Server, which suffered from an open redirect vulnerability, permitting an attacker to control the redirection path of end users.
Note: 1E Platform's component utilizing the third-party Duende Identity Server has been updated with the patch that includes the fix.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.1e.com/trust-security-compliance/cve-info/ |
History
Fri, 06 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
1e
1e platform |
|
Weaknesses | CWE-601 | |
CPEs | cpe:2.3:a:1e:platform:23.11.1.15:*:*:*:*:*:*:* cpe:2.3:a:1e:platform:23.7.1.80:*:*:*:*:*:*:* cpe:2.3:a:1e:platform:24.7:*:*:*:*:*:*:* cpe:2.3:a:1e:platform:8.4.1.229:*:*:*:*:*:*:* |
|
Vendors & Products |
1e
1e platform |
MITRE
Status: PUBLISHED
Assigner: 1E
Published: 2024-08-01T16:49:47.597Z
Updated: 2024-08-02T12:56:59.320Z
Reserved: 2024-07-29T16:05:07.068Z
Link: CVE-2024-7211
Vulnrichment
Updated: 2024-08-01T17:33:33.282Z
NVD
Status : Analyzed
Published: 2024-08-01T17:16:09.727
Modified: 2024-09-06T13:23:07.237
Link: CVE-2024-7211
Redhat
No data.