### [CVE-2024-0580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0580) ![](https://img.shields.io/static/v1?label=Product&message=Sinergia%2C%20Sinergia%202.0%2C%20and%20Sinergia%20Corporativo&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%202.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen) ### Description Omission of user-controlled key authorization in the IDMSistemas platform, affecting the QSige product. This vulnerability allows an attacker to extract sensitive information from the API by making a request to the parameter '/qsige.locator/quotePrevious/centers/X', where X supports values 1,2,3, etc. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds