cve/2024/CVE-2024-51382.md

20 lines
974 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-51382](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51382)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=3.9.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Cross-Site Request Forgery (CSRF) vulnerability in JATOS v3.9.3 allows an attacker to reset the administrator's password. This critical security flaw can result in unauthorized access to the platform, enabling attackers to hijack admin accounts and compromise the integrity and security of the system.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- https://hacking-notes.medium.com/cve-2024-51382-jatos-v3-9-3-csrf-admin-password-reset-1adeff0386ed
2025-09-29 16:08:36 +00:00
#### Github
- https://github.com/Hacking-Notes/CVE
2025-09-29 21:09:30 +02:00
- https://github.com/Hacking-Notes/Hacking-Notes
2025-09-29 16:08:36 +00:00