{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T12:44:08.089","vulnerabilities":[{"cve":{"id":"CVE-2024-50633","sourceIdentifier":"cve@mitre.org","published":"2025-01-16T18:15:24.337","lastModified":"2025-09-19T18:48:08.453","vulnStatus":"Analyzed","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"A Broken Object Level Authorization (BOLA) vulnerability in Indico through 3.3.5 allows attackers to read information by sending a crafted POST request to the component /api/principals. NOTE: this is disputed by the Supplier because the product intentionally lets all users retrieve certain information about other user accounts (this functionality is, in the current design, not restricted to any privileged roles such as event organizer)."},{"lang":"es","value":"Una vulnerabilidad de autorización a nivel de objeto roto (BOLA) en Indico v3.2.9 permite a los atacantes acceder a información confidencial mediante el envío de una solicitud POST manipulada al componente /api/principals."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N","baseScore":0.0,"baseSeverity":"NONE","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":0.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-201"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cern:indico:*:*:*:*:*:*:*:*","versionStartIncluding":"3.2.9","versionEndIncluding":"3.3.2","matchCriteriaId":"92DAF65C-29FD-4A9D-93EF-6233795BA46B"}]}]}],"references":[{"url":"https://github.com/cetinpy/CVE-2024-50633","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/cetinpy/CVE-2024-50633/issues/1","source":"cve@mitre.org","tags":["Issue Tracking"]}]}}]}