Skip to content

CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.

Notifications You must be signed in to change notification settings

d4lyw/CVE-2024-46627

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.

DATAGERRY v2.2 lacks access control in the REST API for the following endpoints:

/rest/users/<id>/settings/ (GET, POST)

/rest/users/<id>/settings/<setting> (DELETE, PUT)

This allows an attacker to read settings, create settings, delete settings, and update settings of any user without authentication.

Additional information

This is expected to be fixed in the next release.

Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46627

About

CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published