CVE-2024-48987

Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values.
Configurations

Configuration 1 (hide)

cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*

History

22 May 2025, 17:56

Type Values Removed Values Added
First Time Snipeitapp
Snipeitapp snipe-it
CPE cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*
References () https://github.com/snipe/snipe-it/releases/tag/v7.0.10 - () https://github.com/snipe/snipe-it/releases/tag/v7.0.10 - Release Notes
References () https://www.synacktiv.com/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known - () https://www.synacktiv.com/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known - Exploit, Third Party Advisory

25 Mar 2025, 16:15

Type Values Removed Values Added
CWE CWE-1393

07 Jan 2025, 16:15

Type Values Removed Values Added
References
  • () https://www.synacktiv.com/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known -

Information

Published : 2024-10-11 13:15

Updated : 2025-05-22 17:56


NVD link : CVE-2024-48987

Mitre link : CVE-2024-48987

CVE.ORG link : CVE-2024-48987


JSON object : View

Products Affected

snipeitapp

  • snipe-it
CWE
CWE-1393

Use of Default Password