First published: Tue May 21 2024(Updated: )
An issue was discovered in Italtel Embrace 1.6.4. The server does not properly handle application errors. In some cases, this leads to a disclosure of information about the server. An unauthenticated user is able craft specific requests in order to make the application generate an error. Inside an error message, some information about the server is revealed, such as the absolute path of the source code of the application. This kind of information can help an attacker to perform other attacks against the system. This can be exploited without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Italtel Embrace | =1.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31844 has been categorized with a severity level that indicates a medium risk due to information disclosure vulnerabilities.
To fix CVE-2024-31844, it is essential to update to the latest version of Italtel Embrace that includes security patches for this vulnerability.
CVE-2024-31844 affects users of Italtel Embrace version 1.6.4, specifically those who may expose sensitive information through application errors.
CVE-2024-31844 is classified as an information disclosure vulnerability due to improper handling of application errors.
Yes, CVE-2024-31844 can be exploited remotely by unauthenticated users who craft specific requests to trigger application errors.