First published: Tue Aug 06 2024(Updated: )
HaloITSM versions up to 2.146.1 are affected by a Template Injection vulnerability within the engine used to generate emails. This can lead to the leakage of potentially sensitive information. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
Credit: vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
HaloITSM | <2.143.21 | |
HaloITSM | >=2.144<2.146.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6201 is considered a high severity vulnerability due to its potential for leaking sensitive information.
To mitigate CVE-2024-6201, upgrade to HaloITSM version 2.146.2 or later, or apply patches starting from version 2.143.61.
HaloITSM versions up to 2.146.1 are affected by CVE-2024-6201, specifically those between versions 2.144 and 2.146.1.
CVE-2024-6201 is classified as a Template Injection vulnerability within the email generation engine.
The consequences of CVE-2024-6201 may include unauthorized access to sensitive information through email templates.