Syltek application before its 10.22.00 version, does not correctly check that a product ID has a valid payment associated to it. This could allow an attacker to forge a request and bypass the payment system by marking items as payed without any verification.
References
Link | Resource |
---|---|
https://www.incibe-cert.es/en/early-warning/security-advisories/syltek-insufficient-verification-data-authenticity | Third Party Advisory |
https://www.incibe-cert.es/en/early-warning/security-advisories/syltek-insufficient-verification-data-authenticity | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.incibe-cert.es/en/early-warning/security-advisories/syltek-insufficient-verification-data-authenticity - Third Party Advisory |
Information
Published : 2022-03-18 18:15
Updated : 2024-11-21 06:36
NVD link : CVE-2021-4031
Mitre link : CVE-2021-4031
CVE.ORG link : CVE-2021-4031
JSON object : View
Products Affected
syltek
- syltek
CWE
CWE-345
Insufficient Verification of Data Authenticity