OcoMon 4.0RC1 is vulnerable to Incorrect Access Control. Through a request the user can obtain the real email, sending the same request with correct email its possible to account takeover.
References
Link | Resource |
---|---|
https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc | Exploit Third Party Advisory |
https://ocomonphp.sourceforge.io/ | Product Third Party Advisory |
https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc | Exploit Third Party Advisory |
https://ocomonphp.sourceforge.io/ | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc - Exploit, Third Party Advisory | |
References | () https://ocomonphp.sourceforge.io/ - Product, Third Party Advisory |
Information
Published : 2022-10-19 02:15
Updated : 2024-11-21 07:22
NVD link : CVE-2022-40798
Mitre link : CVE-2022-40798
CVE.ORG link : CVE-2022-40798
JSON object : View
Products Affected
ocomon_project
- ocomon
CWE