B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-01-23 21:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4626
Mitre link : CVE-2015-4626
CVE.ORG link : CVE-2015-4626
JSON object : View
Products Affected
treasuryxpress
- c2box
CWE
CWE-189
Numeric Errors