CVE-2024-9513

A vulnerability was found in Netadmin Software NetAdmin IAM up to 3.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /controller/api/Answer/ReturnUserQuestionsFilled of the component HTTP POST Request Handler. The manipulation of the argument username leads to information exposure through discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure is planning to release a fix in mid-October 2024.
References
Link Resource
https://vuldb.com/?ctiid.279212 Permissions Required VDB Entry
https://vuldb.com/?id.279212 Third Party Advisory VDB Entry
https://vuldb.com/?submit.413498 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:netadmin:netadmin_iam:*:*:*:*:*:*:*:*

History

13 Nov 2024, 21:57

Type Values Removed Values Added
CPE cpe:2.3:a:netadmin:netadmin_iam:*:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.279212 - () https://vuldb.com/?ctiid.279212 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.279212 - () https://vuldb.com/?id.279212 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.413498 - () https://vuldb.com/?submit.413498 - Exploit, Third Party Advisory, VDB Entry
First Time Netadmin
Netadmin netadmin Iam

07 Oct 2024, 21:15

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en Netadmin Software NetAdmin IAM hasta la versión 3.5 y se ha clasificado como problemática. Este problema afecta a algunas funciones desconocidas del archivo /controller/api/Answer/ReturnUserQuestionsFilled del componente HTTP POST Request Handler. La manipulación del argumento username provoca la exposición de información a través de discrepancias. El ataque puede lanzarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotación es difícil. La explotación se ha hecho pública y puede utilizarse. Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
Summary (en) A vulnerability was found in Netadmin Software NetAdmin IAM up to 3.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /controller/api/Answer/ReturnUserQuestionsFilled of the component HTTP POST Request Handler. The manipulation of the argument username leads to information exposure through discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability was found in Netadmin Software NetAdmin IAM up to 3.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /controller/api/Answer/ReturnUserQuestionsFilled of the component HTTP POST Request Handler. The manipulation of the argument username leads to information exposure through discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure is planning to release a fix in mid-October 2024.

04 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-04 13:15

Updated : 2024-11-13 21:57


NVD link : CVE-2024-9513

Mitre link : CVE-2024-9513

CVE.ORG link : CVE-2024-9513


JSON object : View

Products Affected

netadmin

  • netadmin_iam
CWE
CWE-203

Observable Discrepancy