CVE-2025-24948

In JotUrl 2.0, passwords are sent via HTTP GET-type requests, potentially exposing credentials to eavesdropping or insecure records.
References
Link Resource
https://www.gruppotim.it/it/footer/red-team.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:joturl:joturl:2.0:*:*:*:*:*:*:*

History

22 Apr 2025, 18:41

Type Values Removed Values Added
CPE cpe:2.3:a:joturl:joturl:2.0:*:*:*:*:*:*:*
References () https://www.gruppotim.it/it/footer/red-team.html - () https://www.gruppotim.it/it/footer/red-team.html - Third Party Advisory
First Time Joturl
Joturl joturl
Summary
  • (es) En JotUrl 2.0, las contraseñas se envían a través de solicitudes de tipo HTTP GET, lo que potencialmente expone las credenciales a escuchas clandestinas o registros inseguros.

15 Apr 2025, 20:15

Type Values Removed Values Added
CWE CWE-598
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

15 Apr 2025, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-15 16:16

Updated : 2025-04-22 18:41


NVD link : CVE-2025-24948

Mitre link : CVE-2025-24948

CVE.ORG link : CVE-2025-24948


JSON object : View

Products Affected

joturl

  • joturl
CWE
CWE-598

Use of GET Request Method With Sensitive Query Strings