Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50488: Authentication Bypass Using an Alternate Path or Channel in yespbs Token Login

0
Unknown
VulnerabilityCVE-2024-50488cvecve-2024-50488
Published: Mon Oct 28 2024 (10/28/2024, 12:28:22 UTC)
Source: CVE Database V5
Vendor/Project: yespbs
Product: Token Login

Description

Authentication Bypass Using an Alternate Path or Channel vulnerability in yespbs Token Login token-login allows Authentication Bypass.This issue affects Token Login: from n/a through <= 1.0.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:33:12 UTC

Technical Analysis

CVE-2024-50488 describes an authentication bypass vulnerability in the yespbs Token Login product, specifically versions up to and including 1.0.3. The vulnerability arises from the ability to use an alternate path or communication channel to circumvent the normal token-based authentication process. Token Login is designed to provide secure authentication via tokens, but this flaw allows attackers to bypass these controls and gain unauthorized access. The vulnerability does not have an assigned CVSS score yet, but its nature suggests a critical weakness in the authentication mechanism. No patches or fixes have been published at the time of disclosure, and no known exploits have been reported in the wild. The issue was reserved and published in late October 2024. The lack of CWE classification indicates limited public technical details, but the core issue is a failure in enforcing authentication checks properly. This could allow attackers to impersonate legitimate users or escalate privileges, compromising system confidentiality and integrity. The vulnerability likely requires network access to the authentication service but does not require user interaction, increasing the risk of automated exploitation. Organizations using yespbs Token Login should prioritize monitoring and prepare to apply patches once available.

Potential Impact

The authentication bypass vulnerability in yespbs Token Login poses a significant risk to organizations relying on this product for secure user authentication. Successful exploitation could allow attackers to gain unauthorized access to sensitive systems and data, bypassing all token-based authentication controls. This compromises confidentiality by exposing protected information and integrity by allowing unauthorized actions under assumed identities. Availability impact is less direct but could occur if attackers use access to disrupt services or escalate privileges to disable security controls. The absence of known exploits currently limits immediate risk, but the vulnerability's nature makes it a prime target for attackers once exploit code becomes available. Organizations in sectors with high security requirements, such as finance, healthcare, and government, could face severe consequences including data breaches, regulatory penalties, and reputational damage. The vulnerability's exploitation ease is moderate to high given no user interaction is required and it targets a fundamental security mechanism. Overall, the threat undermines trust in the authentication process and could facilitate further attacks within compromised environments.

Mitigation Recommendations

To mitigate CVE-2024-50488, organizations should first identify all deployments of yespbs Token Login version 1.0.3 or earlier and isolate these systems from untrusted networks where possible. Implement network-level access controls to restrict access to the authentication service to trusted hosts and networks only. Monitor authentication logs closely for unusual or suspicious login attempts that may indicate exploitation attempts. Employ multi-factor authentication (MFA) at additional layers beyond the vulnerable token login system to reduce risk. Prepare to apply vendor patches or updates immediately once they become available. In the interim, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block attempts to exploit alternate authentication paths. Conduct thorough security audits and penetration tests focusing on authentication mechanisms to identify other potential weaknesses. Educate security teams about this vulnerability and ensure incident response plans include scenarios involving authentication bypass. Finally, maintain up-to-date backups and ensure rapid recovery capabilities in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-10-24T07:26:46.795Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74f7e6bfc5ba1df02023

Added to database: 4/1/2026, 7:41:43 PM

Last enriched: 4/2/2026, 7:33:12 AM

Last updated: 4/6/2026, 9:23:09 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses