An issue was discovered in Italtel Embrace 1.6.4. The web application inserts the access token of an authenticated user inside GET requests. The query string for the URL could be saved in the browser's history, passed through Referers to other web sites, stored in web logs, or otherwise recorded in other sources. If the query string contains sensitive information such as session identifiers, then attackers can use this information to launch further attacks. Because the access token in sent in GET requests, this vulnerability could lead to complete account takeover.
References
Link | Resource |
---|---|
https://www.gruppotim.it/it/footer/red-team.html | Third Party Advisory |
Configurations
History
29 Oct 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 |
13 Sep 2024, 14:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://www.gruppotim.it/it/footer/red-team.html - Third Party Advisory | |
CPE | cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:* | |
First Time |
Italtel embrace
Italtel |
|
CWE | NVD-CWE-noinfo |
21 Aug 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-20 20:15
Updated : 2024-10-29 21:35
NVD link : CVE-2024-31842
Mitre link : CVE-2024-31842
CVE.ORG link : CVE-2024-31842
JSON object : View
Products Affected
italtel
- embrace
CWE