Dell EMC CloudLink 7.1.3 and all earlier versions, Auth Token is exposed in GET requests. These request parameters can get logged in reverse proxies and server logs. Attackers may potentially use these tokens to access CloudLink server. Tokens should not be used in request URL to avoid such attacks.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: dell

Published: 2022-03-16T00:00:00

Updated: 2022-05-26T15:20:17

Reserved: 2022-02-04T00:00:00


Link: CVE-2022-24414

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-05-26T16:15:07.920

Modified: 2022-06-07T17:21:15.767


Link: CVE-2022-24414

JSON object: View

cve-icon Redhat Information

No data.