Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-6414
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-30 Jun, 2024 | 03:00
Updated At-01 Aug, 2024 | 21:41
Rejected At-
▼CVE Numbering Authority (CNA)
Parsec Automation TrakSYS Export Page contentpage direct request

A vulnerability classified as problematic has been found in Parsec Automation TrakSYS 11.x.x. Affected is an unknown function of the file TS/export/contentpage of the component Export Page. The manipulation of the argument ID leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270000. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Affected Products
Vendor
Parsec Automation
Product
TrakSYS
Modules
  • Export Page
Versions
Affected
  • 11.x.x
Problem Types
TypeCWE IDDescription
CWECWE-425CWE-425 Direct Request
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
3.05.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2.05.0N/A
AV:N/AC:L/Au:N/C:P/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Gab3 (VulDB User)
Timeline
EventDate
Advisory disclosed2024-06-29 00:00:00
VulDB entry created2024-06-29 02:00:00
VulDB entry last update2024-06-29 13:37:09
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.270000
vdb-entry
technical-description
https://vuldb.com/?ctiid.270000
signature
permissions-required
https://vuldb.com/?submit.361518
third-party-advisory
https://kiwiyumi.com/post/traksys-export-page-code/
broken-link
exploit
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
parsec_automation
Product
tracksys
CPEs
  • cpe:2.3:a:parsec_automation:tracksys:11.x.x:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 11.x.x
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.270000
vdb-entry
technical-description
x_transferred
https://vuldb.com/?ctiid.270000
signature
permissions-required
x_transferred
https://vuldb.com/?submit.361518
third-party-advisory
x_transferred
https://kiwiyumi.com/post/traksys-export-page-code/
broken-link
exploit
x_transferred
Details not found