CVE-2017-6199

A remote attacker could bypass the Sandstorm organization restriction before build 0.203 via a comma in an email-address field.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sandstorm:sandstorm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:29

Type Values Removed Values Added
References () https://devco.re/blog/2018/01/26/Sandstorm-Security-Review-CVE-2017-6200-en/ - Exploit, Third Party Advisory () https://devco.re/blog/2018/01/26/Sandstorm-Security-Review-CVE-2017-6200-en/ - Exploit, Third Party Advisory
References () https://github.com/sandstorm-io/sandstorm/blob/v0.202/shell/packages/sandstorm-db/db.js#L1112 - Third Party Advisory () https://github.com/sandstorm-io/sandstorm/blob/v0.202/shell/packages/sandstorm-db/db.js#L1112 - Third Party Advisory
References () https://github.com/sandstorm-io/sandstorm/commit/37bd9a7f4eb776cdc2d3615f0bfea1254b66f59d - Patch, Third Party Advisory () https://github.com/sandstorm-io/sandstorm/commit/37bd9a7f4eb776cdc2d3615f0bfea1254b66f59d - Patch, Third Party Advisory
References () https://sandstorm.io/news/2017-03-02-security-review - Vendor Advisory () https://sandstorm.io/news/2017-03-02-security-review - Vendor Advisory

Information

Published : 2018-02-06 16:29

Updated : 2024-11-21 03:29


NVD link : CVE-2017-6199

Mitre link : CVE-2017-6199

CVE.ORG link : CVE-2017-6199


JSON object : View

Products Affected

sandstorm

  • sandstorm
CWE
CWE-287

Improper Authentication