Information Exposure Through Query Strings in GET Request vulnerability in LMM API of Secomea GateManager allows system administrator to hijack connection. This issue affects: Secomea GateManager all versions prior to 9.7.
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.secomea.com/support/cybersecurity-advisory/ | vendor advisory |