OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
References
Link | Resource |
---|---|
https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30359 | Exploit Third Party Advisory |
Configurations
History
31 Oct 2024, 16:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | () https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30359 - Exploit, Third Party Advisory | |
CWE | CWE-922 | |
CPE | cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:* | |
First Time |
Ovaledge ovaledge
Ovaledge |
29 Oct 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | CWE-79 |
28 Oct 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-25 17:15
Updated : 2024-10-31 16:37
NVD link : CVE-2022-30359
Mitre link : CVE-2022-30359
CVE.ORG link : CVE-2022-30359
JSON object : View
Products Affected
ovaledge
- ovaledge