_get_flag_ip_localdb in server/mhn/ui/utils.py in Modern Honey Network (MHN) through 2020-11-23 allows attackers to cause a denial-of-service via an IP address that is absent from a local geolocation database, because the code tries to uppercase a return value even if that value is not a string.
References
Link | Resource |
---|---|
https://github.com/pwnlandia/mhn/issues/799 | Exploit Third Party Advisory |
https://github.com/pwnlandia/mhn/issues/799 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pwnlandia/mhn/issues/799 - Exploit, Third Party Advisory |
Information
Published : 2020-11-25 00:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29069
Mitre link : CVE-2020-29069
CVE.ORG link : CVE-2020-29069
JSON object : View
Products Affected
modern_honey_network_project
- modern_honey_network
CWE