This vulnerability exists in the Wave 2.0 due to missing rate limiting on OTP requests in an API endpoint. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoint which could lead to the OTP bombing/flooding on the targeted system.
References
Link | Resource |
---|---|
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0332 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Nov 2024, 15:19
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0332 - Third Party Advisory | |
CPE | cpe:2.3:a:63moons:wave_2.0:*:*:*:*:*:*:*:* cpe:2.3:a:63moons:aero:*:*:*:*:*:*:*:* |
|
First Time |
63moons wave 2.0
63moons 63moons aero |
|
CWE | CWE-770 |
04 Nov 2024, 13:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-04 13:17
Updated : 2024-11-08 15:19
NVD link : CVE-2024-51557
Mitre link : CVE-2024-51557
CVE.ORG link : CVE-2024-51557
JSON object : View
Products Affected
63moons
- aero
- wave_2.0