OcoMon 4.0RC1 is vulnerable to Incorrect Access Control. Through a request the user can obtain the real email, sending the same request with correct email its possible to account takeover.
References
| Link | Resource |
|---|---|
| https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc | Exploit Third Party Advisory |
| https://ocomonphp.sourceforge.io/ | Product Third Party Advisory |
| https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc | Exploit Third Party Advisory |
| https://ocomonphp.sourceforge.io/ | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
08 May 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-284 |
21 Nov 2024, 07:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc - Exploit, Third Party Advisory | |
| References | () https://ocomonphp.sourceforge.io/ - Product, Third Party Advisory |
21 Oct 2022, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:a:ocomon_project:ocomon:4.0:rc1:*:*:*:*:*:* cpe:2.3:a:ocomon_project:ocomon:4.0:-:*:*:*:*:*:* cpe:2.3:a:ocomon_project:ocomon:*:*:*:*:*:*:*:* |
|
| References | (MISC) https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc - Exploit, Third Party Advisory | |
| References | (MISC) https://ocomonphp.sourceforge.io/ - Product, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
19 Oct 2022, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-10-19 02:15
Updated : 2025-05-08 20:15
NVD link : CVE-2022-40798
Mitre link : CVE-2022-40798
CVE.ORG link : CVE-2022-40798
JSON object : View
Products Affected
ocomon_project
- ocomon
CWE
