2025-04-28 20:03:59 +00:00

81 lines
2.7 KiB
JSON

{
"id": "CVE-2024-46293",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-30T15:15:06.123",
"lastModified": "2025-04-28T18:07:39.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Incorrect Access Control. There is a lack of authorization checks for admin operations. Specifically, an attacker can perform admin-level actions without possessing a valid session token. The application does not verify whether the user is logged in as an admin or even check for a session token at all."
},
{
"lang": "es",
"value": "Sourcecodester Online Medicine Ordering System 1.0 es vulnerable a un control de acceso incorrecto. No existen comprobaciones de autorizaci\u00f3n para las operaciones de administraci\u00f3n. En concreto, un atacante puede realizar acciones de nivel de administrador sin poseer un token de sesi\u00f3n v\u00e1lido. La aplicaci\u00f3n no verifica si el usuario ha iniciado sesi\u00f3n como administrador o ni siquiera comprueba si hay un token de sesi\u00f3n. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bunyamindemir/vulnerability-disclosures/blob/main/omos-authorization-bypass.md",
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Third Party Advisory"
]
}
]
}