From 63e52d64a29c084dd00785b75cedf8edbe21a290 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 12 Apr 2024 15:45:38 +0530 Subject: [PATCH] fix-format --- http/cves/2024/CVE-2024-26331.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2024/CVE-2024-26331.yaml b/http/cves/2024/CVE-2024-26331.yaml index cb8267510d..a79cf35618 100644 --- a/http/cves/2024/CVE-2024-26331.yaml +++ b/http/cves/2024/CVE-2024-26331.yaml @@ -4,10 +4,10 @@ info: name: ReCrystallize Server - Authentication Bypass author: Carson Chan severity: high - reference: - - https://preview.sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/ description: | This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the 'AdminUsername' cookie. This gives the attacker administrative access to the application's functionality, even when the default password has been changed. + reference: + - https://preview.sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/ metadata: verified: true max-request: 1