Vulnerability Description
In ebankIT 6, the public endpoints /public/token/Email/generate and /public/token/SMS/generate allow generation of OTP messages to any e-mail address or phone number without validation. (It cannot be exploited with e-mail addresses or phone numbers that are registered in the application.)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ebankit | Ebankit | 6 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.hThird Party AdvisoryVDB Entry
- https://www.ebankit.com/digital-banking-platformProduct
- http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.hThird Party AdvisoryVDB Entry
- https://www.ebankit.com/digital-banking-platformProduct
FAQ
What is CVE-2023-33291?
CVE-2023-33291 is a vulnerability with a CVSS score of 7.4 (HIGH). In ebankIT 6, the public endpoints /public/token/Email/generate and /public/token/SMS/generate allow generation of OTP messages to any e-mail address or phone number without validation. (It cannot be ...
How severe is CVE-2023-33291?
CVE-2023-33291 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33291?
Check the references section above for vendor advisories and patch information. Affected products include: Ebankit Ebankit.