CVE-2022-46383

RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has exposed a privileged token via a public API endpoint (Incorrect Access Control). The token can be used to escalate privileges within the Digital Rebar system and grant full administrative access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rackn:digital_rebar:*:*:*:*:*:*:*:*
cpe:2.3:a:rackn:digital_rebar:*:*:*:*:*:*:*:*
cpe:2.3:a:rackn:digital_rebar:*:*:*:*:*:*:*:*
cpe:2.3:a:rackn:digital_rebar:*:*:*:*:*:*:*:*
cpe:2.3:a:rackn:digital_rebar:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
References () https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html - Vendor Advisory () https://docs.rackn.io/en/latest/doc/security/cve_2022_46383.html - Vendor Advisory
References () https://rackn.com/products/rebar/ - Product, Vendor Advisory () https://rackn.com/products/rebar/ - Product, Vendor Advisory

Information

Published : 2022-12-06 15:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46383

Mitre link : CVE-2022-46383

CVE.ORG link : CVE-2022-46383


JSON object : View

Products Affected

rackn

  • digital_rebar