{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6129","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-06-18T16:21:36.853Z","datePublished":"2024-06-18T21:00:08.822Z","dateUpdated":"2024-08-19T18:08:42.112Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-06-18T21:00:08.822Z"},"title":"spa-cartcms Username login observable behavioral discrepancy","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-205","lang":"en","description":"CWE-205 Observable Behavioral Discrepancy"}]}],"affected":[{"vendor":"n/a","product":"spa-cartcms","versions":[{"version":"1.9.0.6","status":"affected"}],"modules":["Username Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in spa-cartcms 1.9.0.6. Affected is an unknown function of the file /login of the component Username Handler. The manipulation of the argument email leads to observable behavioral discrepancy. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268896."},{"lang":"de","value":"Es wurde eine Schwachstelle in spa-cartcms 1.9.0.6 gefunden. Sie wurde als problematisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /login der Komponente Username Handler. Dank Manipulation des Arguments email mit unbekannten Daten kann eine observable behavioral discrepancy-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Die Komplexität eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2024-06-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-06-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-06-18T18:27:34.000Z","lang":"en","value":"VulDB entry last update"}],"references":[{"url":"https://vuldb.com/?id.268896","name":"VDB-268896 | spa-cartcms Username login observable behavioral discrepancy","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.268896","name":"VDB-268896 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://seclists.org/fulldisclosure/2024/Jun/6","tags":["mailing-list"]},{"url":"https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:33:05.155Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.268896","name":"VDB-268896 | spa-cartcms Username login observable behavioral discrepancy","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.268896","name":"VDB-268896 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://seclists.org/fulldisclosure/2024/Jun/6","tags":["mailing-list","x_transferred"]},{"url":"https://msecureltd.blogspot.com/2024/04/friday-fun-pentest-series-5-spa.html","tags":["exploit","x_transferred"]}]},{"affected":[{"vendor":"spa-cart","product":"spa-cart","cpes":["cpe:2.3:a:spa-cart:spa-cart:1.9.0.6:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.9.0.6","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-19T18:03:02.695390Z","id":"CVE-2024-6129","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-19T18:08:42.112Z"}}]}}