cve/2024/CVE-2024-25635.md
2024-06-18 02:51:15 +02:00

18 lines
1009 B
Markdown

### [CVE-2024-25635](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25635)
![](https://img.shields.io/static/v1?label=Product&message=alf.io&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.0-M4-2402%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-612%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information&color=brighgreen)
### Description
alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/<user_id>` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue.
### POC
#### Reference
- https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f
#### Github
No PoCs found on GitHub currently.