FKIE_CVE-2024-54450

Vulnerability from fkie_nvd - Published: 2024-12-27 20:15 - Updated: 2024-12-28 19:15
Severity ?
Summary
An issue was discovered in Kurmi Provisioning Suite 7.9.0.33. If an X-Forwarded-For header is received during authentication, the Kurmi application will record the (possibly forged) IP address mentioned in that header rather than the real IP address that the user logged in from. This fake IP address can later be displayed in the My Account popup that shows the IP address that was used to log in.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Kurmi Provisioning Suite 7.9.0.33. If an X-Forwarded-For header is received during authentication, the Kurmi application will record the (possibly forged) IP address mentioned in that header rather than the real IP address that the user logged in from. This fake IP address can later be displayed in the My Account popup that shows the IP address that was used to log in."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema en Kurmi Provisioning Suite 7.9.0.33. Si se recibe un encabezado X-Forwarded-For durante la autenticaci\u00f3n, la aplicaci\u00f3n Kurmi registrar\u00e1 la direcci\u00f3n IP (posiblemente falsificada) mencionada en ese encabezado en lugar de la direcci\u00f3n IP real desde la que el usuario inici\u00f3 sesi\u00f3n. Esta direcci\u00f3n IP falsa se puede mostrar m\u00e1s tarde en la ventana emergente Mi cuenta que muestra la direcci\u00f3n IP que se utiliz\u00f3 para iniciar sesi\u00f3n."
    }
  ],
  "id": "CVE-2024-54450",
  "lastModified": "2024-12-28T19:15:07.103",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.4,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-27T20:15:23.313",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://kurmi-software.com"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://kurmi-software.com/cve/cve-2024-54450/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…