A vulnerability in NetCat CMS allows an attacker to send a specially crafted http request that can be used to check whether a user exists in the system, which could be a basis for further attacks.
This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.
Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.
References
Link | Resource |
---|---|
https://github.com/klsecservices/Advisories/blob/master/K-NetCat-2024-001.md | Third Party Advisory |
Configurations
History
23 Sep 2024, 17:51
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://github.com/klsecservices/Advisories/blob/master/K-NetCat-2024-001.md - Third Party Advisory | |
CPE | cpe:2.3:a:netcat:netcat_content_management_system:*:*:*:*:-:*:*:* | |
First Time |
Netcat
Netcat netcat Content Management System |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-19 17:15
Updated : 2024-09-23 17:51
NVD link : CVE-2024-8651
Mitre link : CVE-2024-8651
CVE.ORG link : CVE-2024-8651
JSON object : View
Products Affected
netcat
- netcat_content_management_system