alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/<user_id>` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue.
References
Link | Resource |
---|---|
https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f | Exploit Vendor Advisory |
https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f | Exploit Vendor Advisory |
Configurations
History
18 Dec 2024, 17:51
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
References | () https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:* | |
First Time |
Alf
Alf alf |
Information
Published : 2024-02-19 20:15
Updated : 2024-12-18 17:51
NVD link : CVE-2024-25635
Mitre link : CVE-2024-25635
CVE.ORG link : CVE-2024-25635
JSON object : View
Products Affected
alf
- alf
CWE