CVE-2024-51321

In Zucchetti Ad Hoc Infinity 2.4, an improper check on the m_cURL parameter allows an attacker to redirect the victim to an attacker-controlled website after the authentication.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zucchetti:ad_hoc_infinity:2.4:*:*:*:*:*:*:*

History

28 May 2025, 14:48

Type Values Removed Values Added
First Time Zucchetti ad Hoc Infinity
Zucchetti
References () https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/ - () https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:zucchetti:ad_hoc_infinity:2.4:*:*:*:*:*:*:*

21 Mar 2025, 21:15

Type Values Removed Values Added
CWE CWE-601
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.6
Summary
  • (es) En Zucchetti Ad Hoc Infinity 2.4, una verificación incorrecta del parámetro m_cURL permite a un atacante redirigir a la víctima a un sitio web controlado por el atacante después de la autenticación.

11 Mar 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 15:15

Updated : 2025-05-28 14:48


NVD link : CVE-2024-51321

Mitre link : CVE-2024-51321

CVE.ORG link : CVE-2024-51321


JSON object : View

Products Affected

zucchetti

  • ad_hoc_infinity
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')