CVE-2020-21990

Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
References
Link Resource
https://www.exploit-db.com/exploits/47824 Exploit Third Party Advisory VDB Entry
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php Exploit Third Party Advisory
https://www.exploit-db.com/exploits/47824 Exploit Third Party Advisory VDB Entry
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:domoticz:mydomoathome:0.240:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:12

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/47824 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/47824 - Exploit, Third Party Advisory, VDB Entry
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php - Exploit, Third Party Advisory () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php - Exploit, Third Party Advisory

Information

Published : 2021-04-29 14:15

Updated : 2024-11-21 05:12


NVD link : CVE-2020-21990

Mitre link : CVE-2020-21990

CVE.ORG link : CVE-2020-21990


JSON object : View

Products Affected

domoticz

  • mydomoathome
CWE
CWE-863

Incorrect Authorization