Unprotected Password Change Function Leaves Application Vulnerable to Account Takeover
CVE-2024-28143
8.4HIGH
Key Information:
- Vendor
Image Access Gmbh
- Status
- Vendor
- CVE Published:
- 12 December 2024
Badges
👾 Exploit Exists
What is CVE-2024-28143?
The password change functionality exposed in the Image Access Management Interface allows for a significant security risk, as it does not require the entry of the current password by users. This flaw enables unauthorized individuals to reset user passwords via the -rsetpass+-aaction+- parameter, which may be exploited through Cross-Site Request Forgery (CSRF) techniques. Such an oversight poses a severe threat to the integrity and confidentiality of user accounts, making it imperative for users and administrators to apply the necessary patches provided by the vendor.
Affected Version(s)
Scan2Net 0
References
CVSS V3.1
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Daniel Hirschberger (SEC Consult Vulnerability Lab)
Tobias Niemann (SEC Consult Vulnerability Lab)
