Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-7709
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-13 Aug, 2024 | 00:31
Updated At-03 Sep, 2024 | 19:54
Rejected At-
▼CVE Numbering Authority (CNA)
OcoMon URL require_access_recovery.php cross site scripting

A vulnerability, which was classified as problematic, has been found in OcoMon 4.0RC1/4.0/5.0RC1. This issue affects some unknown processing of the file /includes/common/require_access_recovery.php of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.1 and 5.0 is able to address this issue. It is recommended to upgrade the affected component.

Affected Products
Vendor
n/a
Product
OcoMon
Modules
  • URL Handler
Versions
Affected
  • 4.0
  • 4.0RC1
  • 5.0RC1
Problem Types
TypeCWE IDDescription
CWECWE-79CWE-79 Cross Site Scripting
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
3.04.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
2.05.0N/A
AV:N/AC:L/Au:N/C:N/I:P/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Hydd3n (VulDB User)
Timeline
EventDate
Advisory disclosed2024-08-12 00:00:00
VulDB entry created2024-08-12 02:00:00
VulDB entry last update2024-08-17 11:49:36
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.274205
vdb-entry
https://vuldb.com/?ctiid.274205
signature
permissions-required
https://vuldb.com/?submit.388843
third-party-advisory
https://ocomon.com.br/site/atualizacao-de-seguranca/
related
https://ocomon.com.br/site/downloads/
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
ocomon_project
Product
ocomon
CPEs
  • cpe:2.3:a:ocomon_project:ocomon:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 4.0
  • 4.0rc1
  • 5.0rc1
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found