OpenCTI is an open-source cyber threat intelligence platform. In versions below 6.2.18, because the function to limit the rate of OTP does not exist, an attacker with valid credentials or a malicious user who commits internal fraud can break through the two-factor authentication and hijack the account. This is because the otpLogin mutation does not implement One Time Password rate limiting. As of time of publication, it is unknown whether a patch is available.
References
Link | Resource |
---|---|
https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7 | Vendor Advisory |
https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7 | Vendor Advisory |
Configurations
History
17 May 2025, 02:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:* | |
First Time |
Citeum
Citeum opencti |
|
CWE | CWE-307 | |
References | () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7 - Vendor Advisory |
12 Dec 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 02:02
Updated : 2025-05-17 02:05
NVD link : CVE-2024-45404
Mitre link : CVE-2024-45404
CVE.ORG link : CVE-2024-45404
JSON object : View
Products Affected
citeum
- opencti