2024-02-28 21:00:28 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2024-25170",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2024-02-28T20:15:41.770",
|
2024-02-29 15:04:26 +00:00
|
|
|
"lastModified": "2024-02-29T13:49:47.277",
|
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2024-07-14 02:06:08 +00:00
|
|
|
"cveTags": [],
|
2024-02-28 21:00:28 +00:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header."
|
2024-04-04 08:46:00 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"lang": "es",
|
|
|
|
"value": "Un problema en Mezzanine v6.0.0 permite a los atacantes eludir los controles de acceso manipulando el encabezado del Host."
|
2024-02-28 21:00:28 +00:00
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://ibb.co/DpxHpz9",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://ibb.co/T0fhLwR",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|