CVE-2019-16386

PEGA Platform 7.x and 8.x is vulnerable to Information disclosure via a direct prweb/sso/random_token/!STANDARD?pyActivity=GetWebInfo&target=popup&pzHarnessID=random_harness_id request to get database schema information while using a low-privilege account. NOTE: The vendor states that this vulnerability was discovered using an administrator account and they are normal administrator functions. Therefore, the claim that the CVE was done with a low privilege account is incorrect
References
Link Resource
https://blog.cybercastrum.com/2019/11/25/cve-2019-16386/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:05

Type Values Removed Values Added
Summary ** DISPUTED ** PEGA Platform 7.x and 8.x is vulnerable to Information disclosure via a direct prweb/sso/random_token/!STANDARD?pyActivity=GetWebInfo&target=popup&pzHarnessID=random_harness_id request to get database schema information while using a low-privilege account. NOTE: The vendor states that this vulnerability was discovered using an administrator account and they are normal administrator functions. Therefore, the claim that the CVE was done with a low privilege account is incorrect. PEGA Platform 7.x and 8.x is vulnerable to Information disclosure via a direct prweb/sso/random_token/!STANDARD?pyActivity=GetWebInfo&target=popup&pzHarnessID=random_harness_id request to get database schema information while using a low-privilege account. NOTE: The vendor states that this vulnerability was discovered using an administrator account and they are normal administrator functions. Therefore, the claim that the CVE was done with a low privilege account is incorrect

Information

Published : 2019-11-26 18:15

Updated : 2024-08-05 02:15


NVD link : CVE-2019-16386

Mitre link : CVE-2019-16386

CVE.ORG link : CVE-2019-16386


JSON object : View

Products Affected

pega

  • pega_platform
CWE
CWE-425

Direct Request ('Forced Browsing')