CVE-2020-36125

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control where password revalidation in sensitive operations can be bypassed remotely by an authenticated attacker through requesting the endpoint directly.
Configurations

Configuration 1 (hide)

cpe:2.3:a:paxtechnology:paxstore:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
References () https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory () https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ - Exploit, Third Party Advisory
References () https://marketing.paxtechnology.com/about-pax - Product () https://marketing.paxtechnology.com/about-pax - Product
References () https://www.whatspos.com/ - Product () https://www.whatspos.com/ - Product

Information

Published : 2021-05-07 11:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-36125

Mitre link : CVE-2020-36125

CVE.ORG link : CVE-2020-36125


JSON object : View

Products Affected

paxtechnology

  • paxstore
CWE
CWE-306

Missing Authentication for Critical Function