RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has exposed a privileged token via a public API endpoint (Incorrect Access Control). The token can be used to escalate privileges within the Digital Rebar system and grant full administrative access.
References
Link | Resource |
---|---|
https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html | Vendor Advisory |
https://rackn.com/products/rebar/ | Product Vendor Advisory |
https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html | Vendor Advisory |
https://rackn.com/products/rebar/ | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html - Vendor Advisory | |
References | () https://rackn.com/products/rebar/ - Product, Vendor Advisory |
Information
Published : 2022-12-06 15:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46383
Mitre link : CVE-2022-46383
CVE.ORG link : CVE-2022-46383
JSON object : View
Products Affected
rackn
- digital_rebar
CWE