Rapid7's InsightVM maintenance mode login page suffers from a sensitive information exposure vulnerability whereby, sensitive information is exposed through query strings in the URL when login is attempted before the page is fully loaded. This vulnerability allows attackers to acquire sensitive information such as passwords, auth tokens, usernames etc.
The vulnerability is remediated in version 6.6.244.
References
Link | Resource |
---|---|
https://docs.rapid7.com/release-notes/insightvm/20240327/ | Release Notes |
https://docs.rapid7.com/release-notes/insightvm/20240327/ | Release Notes |
Configurations
History
25 Feb 2025, 18:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rapid7
Rapid7 insightvm |
|
CPE | cpe:2.3:a:rapid7:insightvm:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-Other | |
References | () https://docs.rapid7.com/release-notes/insightvm/20240327/ - Release Notes |
21 Nov 2024, 09:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.rapid7.com/release-notes/insightvm/20240327/ - | |
Summary |
|
02 Apr 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-02 10:15
Updated : 2025-02-25 18:36
NVD link : CVE-2024-2745
Mitre link : CVE-2024-2745
CVE.ORG link : CVE-2024-2745
JSON object : View
Products Affected
rapid7
- insightvm
CWE