CVE-2024-12667

A vulnerability was found in InvoicePlane up to 1.6.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /invoices/view. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
References
Link Resource
https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 Release Notes
https://vuldb.com/?ctiid.288536 Permissions Required VDB Entry
https://vuldb.com/?id.288536 Third Party Advisory VDB Entry
https://vuldb.com/?submit.449923 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*

History

19 Dec 2024, 15:10

Type Values Removed Values Added
References () https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 - () https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 - Release Notes
References () https://vuldb.com/?ctiid.288536 - () https://vuldb.com/?ctiid.288536 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.288536 - () https://vuldb.com/?id.288536 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.449923 - () https://vuldb.com/?submit.449923 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*
First Time Invoiceplane
Invoiceplane invoiceplane
Summary
  • (es) Se ha detectado una vulnerabilidad en InvoicePlane hasta la versión 1.6.1 y se ha clasificado como problemática. Este problema afecta a algunas funciones desconocidas del archivo /invoices/view. La manipulación provoca la caducidad de la sesión. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotación es difícil. El exploit se ha hecho público y puede utilizarse. La actualización a la versión 1.6.2-beta-1 puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contactó al proveedor con prontitud, respondió de manera muy profesional y lanzó rápidamente una versión corregida del producto afectado.

16 Dec 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-16 20:15

Updated : 2024-12-19 15:10


NVD link : CVE-2024-12667

Mitre link : CVE-2024-12667

CVE.ORG link : CVE-2024-12667


JSON object : View

Products Affected

invoiceplane

  • invoiceplane
CWE
CWE-613

Insufficient Session Expiration