Authentication Bypass Using an Alternate Path or Channel Affecting mezzanine package, versions [0,]
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (16th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-MEZZANINE-6335433
- published 29 Feb 2024
- disclosed 28 Feb 2024
- credit shenhav12
Introduced: 28 Feb 2024
CVE-2024-25170 Open this link in a new tabHow to fix?
There is no fixed version for Mezzanine
.
Overview
Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to the manipulation of the Host
header. An attacker can bypass access controls by crafting malicious Host
header values.
References
CVSS Scores
version 3.1