Vulnerability Description
This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing invalid inputs for “userId” parameter in the API request leading to generation of error message containing sensitive information on the targeted system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 63Moons | Aero | < 120820241550 |
| 63Moons | Wave 2.0 | < 1.1.7 |
Related Weaknesses (CWE)
References
- https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0Third Party Advisory
FAQ
What is CVE-2024-51560?
CVE-2024-51560 is a vulnerability with a CVSS score of 4.3 (MEDIUM). This vulnerability exists in the Wave 2.0 due to improper exception handling for invalid inputs at certain API endpoint. An authenticated remote attacker could exploit this vulnerability by providing ...
How severe is CVE-2024-51560?
CVE-2024-51560 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-51560?
Check the references section above for vendor advisories and patch information. Affected products include: 63Moons Aero, 63Moons Wave 2.0.