cve/2024/CVE-2024-51381.md

20 lines
1012 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-51381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51381)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=3.9.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Cross-Site Request Forgery (CSRF) vulnerability in JATOS v3.9.3 that allows attackers to perform actions reserved for administrators, including creating admin accounts. This critical flaw can lead to unauthorized activities, compromising the security and integrity of the platform, especially if an attacker gains administrative control.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- https://hacking-notes.medium.com/cve-2024-51381-jatos-v3-9-3-csrf-admin-account-creation-94035f24d0be
2025-09-29 16:08:36 +00:00
#### Github
- https://github.com/Hacking-Notes/CVE
- https://github.com/Hacking-Notes/Hacking-Notes