Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42795: n/a

0
Medium
VulnerabilityCVE-2024-42795cvecve-2024-42795
Published: Mon Sep 16 2024 (09/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An Incorrect Access Control vulnerability was found in /music/view_user.php?id=3 and /music/controller.php?page=edit_user&id=3 in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to view valid user details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:17:13 UTC

Technical Analysis

CVE-2024-42795 identifies an Incorrect Access Control vulnerability in Kashipara Music Management System version 1.0. The issue resides in two specific PHP scripts: /music/view_user.php and /music/controller.php, where the parameters 'id' and 'page' are used without proper authorization checks. This flaw permits an unauthenticated attacker to access valid user details by manipulating the 'id' parameter in the URL, bypassing intended access restrictions. The vulnerability is classified under CWE-284 (Improper Access Control), indicating that the system fails to enforce proper permission checks before disclosing sensitive information. The CVSS 3.1 base score is 4.2 (medium), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L, meaning the attack requires local access and high privileges but no user interaction. The impact includes limited confidentiality, integrity, and availability loss, primarily through unauthorized information disclosure. No patches or mitigations have been officially released, and no active exploitation has been reported. This vulnerability highlights the importance of rigorous access control validation in web applications, especially those managing user data. Organizations using this system should audit and restrict access to these endpoints and monitor for suspicious activity.

Potential Impact

The primary impact of CVE-2024-42795 is unauthorized disclosure of user details, which can compromise user privacy and potentially facilitate further attacks such as social engineering or privilege escalation. Although the vulnerability requires local access and high privileges, it still poses a risk if an attacker gains such access, for example through insider threats or compromised accounts. The exposure of user information can damage organizational reputation and violate data protection regulations. The integrity and availability impacts are limited but present, as unauthorized access might allow attackers to view or potentially manipulate user-related data. Since no known exploits are in the wild, the immediate threat is moderate; however, the vulnerability could be leveraged in multi-stage attacks. Organizations relying on Kashipara Music Management System should consider this a moderate risk that warrants timely remediation to prevent data leakage and maintain compliance with security best practices.

Mitigation Recommendations

To mitigate CVE-2024-42795, organizations should implement strict access control checks on the affected endpoints (/music/view_user.php and /music/controller.php). This includes validating user privileges before processing 'id' and 'page' parameters to ensure only authorized users can access or edit user details. Employ role-based access control (RBAC) mechanisms and enforce the principle of least privilege. Conduct thorough code reviews and penetration testing focusing on access control enforcement. If possible, restrict access to these scripts to trusted internal networks or authenticated sessions only. Monitor logs for unusual access patterns to these endpoints. Since no official patch is available, consider applying custom patches or workarounds such as input validation and session verification. Additionally, educate administrators and users about the risks of privilege misuse and enforce strong authentication methods to reduce the likelihood of privilege escalation. Maintain up-to-date backups and incident response plans in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cceb7ef31ef0b569348

Added to database: 2/25/2026, 9:42:38 PM

Last enriched: 2/28/2026, 6:17:13 AM

Last updated: 4/12/2026, 6:17:33 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses