An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header.
References
Link | Resource |
---|---|
https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 | Third Party Advisory |
https://ibb.co/DpxHpz9 | Exploit |
https://ibb.co/T0fhLwR | Exploit |
https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 | Third Party Advisory |
https://ibb.co/DpxHpz9 | Exploit |
https://ibb.co/T0fhLwR | Exploit |
Configurations
History
28 Apr 2025, 13:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jupo:mezzanine:6.0.0:*:*:*:*:*:*:* | |
References | () https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0 - Third Party Advisory | |
References | () https://ibb.co/DpxHpz9 - Exploit | |
References | () https://ibb.co/T0fhLwR - Exploit | |
First Time |
Jupo
Jupo mezzanine |
Information
Published : 2024-02-28 20:15
Updated : 2025-04-28 13:45
NVD link : CVE-2024-25170
Mitre link : CVE-2024-25170
CVE.ORG link : CVE-2024-25170
JSON object : View
Products Affected
jupo
- mezzanine
CWE
CWE-863
Incorrect Authorization