Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork components that can result in A standard unprivileged user could gain system administrator permissions within the web portal.. This attack appear to be exploitable via The user must be able to login, and could edit their profile and set the "System Administrator" permission to "yes" on themselves.. This vulnerability appears to have been fixed in 1.4.6 RC2.
References
Link | Resource |
---|---|
https://github.com/tridentli/pitchfork/commit/33549f15707801099e1253dd5e79369bd48eb59b | Patch Third Party Advisory |
https://github.com/tridentli/pitchfork/commit/9fd07cbe4f93e1367e142016e9a205366680dd54 | Patch Third Party Advisory |
https://github.com/tridentli/pitchfork/issues/168 | Issue Tracking Third Party Advisory |
https://github.com/tridentli/trident/releases/tag/DEV_1.4.6-RC2 | Third Party Advisory |
https://thomas-ward.net/security-advisories/trident-trusted-communications-platform-privilege-escalation-issue-advisory/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-03-16 14:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-1000133
Mitre link : CVE-2018-1000133
CVE.ORG link : CVE-2018-1000133
JSON object : View
Products Affected
secluded
- trident
CWE
CWE-269
Improper Privilege Management