NATO NCI ANET 3.4.1 mishandles report ownership. A user can create a report and, despite the restrictions imposed by the UI, change the author of that report to an arbitrary user (without their consent or knowledge) via a modified UUID in a POST request.
References
| Link | Resource |
|---|---|
| https://www.linkedin.com/pulse/idors-ncia-anet-v341-visionspace-technologies-hepxe | Exploit Third Party Advisory |
| https://www.linkedin.com/pulse/idors-ncia-anet-v341-visionspace-technologies-hepxe | Exploit Third Party Advisory |
Configurations
History
20 Jun 2025, 18:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ncia
Ncia advisor Network |
|
| References | () https://www.linkedin.com/pulse/idors-ncia-anet-v341-visionspace-technologies-hepxe - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:ncia:advisor_network:3.4.1:*:*:*:*:*:*:* |
Information
Published : 2024-07-17 17:15
Updated : 2025-06-20 18:09
NVD link : CVE-2024-38446
Mitre link : CVE-2024-38446
CVE.ORG link : CVE-2024-38446
JSON object : View
Products Affected
ncia
- advisor_network
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
