Vulnerability Description
Puncia is the Official CLI utility for Subdomain Center & Exploit Observer. `API_URLS` is utilizing HTTP instead of HTTPS for communication that can lead to issues like Eavesdropping, Data Tampering, Unauthorized Data Access & MITM Attacks. This issue has been addressed in release version 0.21 by using https rather than http connections. All users are advised to upgrade. There is no known workarounds for this vulnerability.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/ARPSyndicate/puncia/commit/033f3b68126eabbb2040ce16e2c3a2ce17
- https://github.com/ARPSyndicate/puncia/issues/8
- https://github.com/ARPSyndicate/puncia/security/advisories/GHSA-rwcj-7jjp-4w38
- https://github.com/ARPSyndicate/puncia/commit/033f3b68126eabbb2040ce16e2c3a2ce17
- https://github.com/ARPSyndicate/puncia/issues/8
- https://github.com/ARPSyndicate/puncia/security/advisories/GHSA-rwcj-7jjp-4w38
FAQ
What is CVE-2024-41124?
CVE-2024-41124 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Puncia is the Official CLI utility for Subdomain Center & Exploit Observer. `API_URLS` is utilizing HTTP instead of HTTPS for communication that can lead to issues like Eavesdropping, Data Tampering, ...
How severe is CVE-2024-41124?
CVE-2024-41124 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41124?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.