Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information.
References
Link | Resource |
---|---|
https://www.usom.gov.tr/bildirim/tr-22-0093 | Third Party Advisory |
https://www.usom.gov.tr/bildirim/tr-22-0093 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.usom.gov.tr/bildirim/tr-22-0093 - Third Party Advisory |
17 Sep 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. |
03 Sep 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. |
Information
Published : 2022-01-27 13:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44792
Mitre link : CVE-2021-44792
CVE.ORG link : CVE-2021-44792
JSON object : View
Products Affected
krontech
- single_connect
CWE
CWE-862
Missing Authorization