Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50647: n/a

0
High
VulnerabilityCVE-2024-50647cvecve-2024-50647
Published: Fri Nov 15 2024 (11/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The python_food ordering system V1.0 has an unauthorized vulnerability that leads to the leakage of sensitive user information. Attackers can access it through https://ip:port/api/myapp/index/user/info?id=1 And modify the ID value to obtain sensitive user information beyond authorization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:40:20 UTC

Technical Analysis

CVE-2024-50647 identifies an authorization bypass vulnerability in the python_food ordering system version 1.0. The vulnerability resides in the API endpoint at /api/myapp/index/user/info, where the 'id' parameter is used to fetch user information. Due to insufficient authorization checks (CWE-863), an attacker can modify the 'id' value in the URL query string to access sensitive user data belonging to other users without proper permissions. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is a high confidentiality breach, as attackers can retrieve sensitive personal information. The vulnerability does not affect integrity or availability. No patches or fixes have been published yet, and no known exploits have been reported in the wild. This vulnerability highlights a critical failure in access control mechanisms within the application’s API design, allowing horizontal privilege escalation. Organizations deploying this system should urgently review their authorization logic and implement robust access control checks to prevent unauthorized data disclosure.

Potential Impact

The primary impact of CVE-2024-50647 is the unauthorized disclosure of sensitive user information, which can lead to privacy violations, identity theft, and regulatory non-compliance (e.g., GDPR, CCPA). Attackers can exploit this vulnerability remotely without authentication, increasing the attack surface and risk of mass data exposure. The breach of confidentiality can damage organizational reputation and customer trust, potentially resulting in financial losses and legal consequences. Since the vulnerability does not affect data integrity or system availability, the direct operational disruption is limited; however, the exposure of sensitive data can indirectly lead to further attacks such as phishing or social engineering. Organizations relying on the python_food ordering system may face significant risks if they do not implement immediate mitigations, especially those handling large volumes of personal or payment-related data.

Mitigation Recommendations

1. Implement strict server-side authorization checks to validate that users can only access their own data, enforcing proper access control on the 'id' parameter in API requests. 2. Introduce parameter validation and enforce least privilege principles within the API to prevent horizontal privilege escalation. 3. Employ API gateways or web application firewalls (WAFs) to detect and block suspicious parameter tampering attempts. 4. Conduct thorough code reviews and security testing focusing on authorization logic for all API endpoints. 5. Monitor API logs for unusual access patterns or repeated attempts to access unauthorized user IDs. 6. If possible, disable or restrict access to the vulnerable API endpoint until a patch or update is available. 7. Educate developers on secure coding practices related to authorization and input validation. 8. Prepare an incident response plan to quickly address any data breaches resulting from exploitation. 9. Engage with the vendor or development team to expedite the release of a security patch or update.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b9cb7ef31ef0b5572b8

Added to database: 2/25/2026, 9:37:32 PM

Last enriched: 2/27/2026, 10:40:20 PM

Last updated: 4/12/2026, 5:11:47 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses