Vulnerability Description
The /device/acceptBind end-point for Ourphoto App version 1.4.1 does not require authentication or authorization. The user_token header is not implemented or present on this end-point. An attacker can send a request to bind their account to any users picture frame, then send a POST request to accept their own bind request, without the end-users approval or interaction.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sz-Fujia | Ourphoto | 1.4.1 |
Related Weaknesses (CWE)
References
- https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-picsExploitTechnical DescriptionThird Party Advisory
- https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-picsExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2022-24190?
CVE-2022-24190 is a vulnerability with a CVSS score of 7.5 (HIGH). The /device/acceptBind end-point for Ourphoto App version 1.4.1 does not require authentication or authorization. The user_token header is not implemented or present on this end-point. An attacker can...
How severe is CVE-2022-24190?
CVE-2022-24190 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24190?
Check the references section above for vendor advisories and patch information. Affected products include: Sz-Fujia Ourphoto.