### [CVE-2024-25635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25635) ![](https://img.shields.io/static/v1?label=Product&message=alf.io&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.0-M4-2402%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-612%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information&color=brighgreen) ### Description alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue. ### POC #### Reference - https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f #### Github No PoCs found on GitHub currently.