SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header.
References
Link | Resource |
---|---|
https://github.com/erberkan/SonLogger-vulns | Exploit Third Party Advisory |
https://www.sonlogger.com/releasenotes | Release Notes Vendor Advisory |
https://github.com/erberkan/SonLogger-vulns | Exploit Third Party Advisory |
https://www.sonlogger.com/releasenotes | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/erberkan/SonLogger-vulns - Exploit, Third Party Advisory | |
References | () https://www.sonlogger.com/releasenotes - Release Notes, Vendor Advisory |
Information
Published : 2021-03-05 02:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27963
Mitre link : CVE-2021-27963
CVE.ORG link : CVE-2021-27963
JSON object : View
Products Affected
sfcyazilim
- sonlogger
CWE
CWE-306
Missing Authentication for Critical Function