CVE-2021-33031

In LabCup before <v2_next_18022, it is possible to use the save API to perform unauthorized actions for users without access to user management in order to, after successful exploitation, gain access to a victim's account. A user without the user-management privilege can change another user's email address if the attacker knows details of the victim such as the exact roles and group roles, ID, and remote authentication ID settings. These must be sent in a modified save API request. It was fixed in 6.3.0.03.
Configurations

Configuration 1 (hide)

cpe:2.3:a:labcup:labcup:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md - Third Party Advisory () https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md - Third Party Advisory
References () https://labcup.net/privacy-data-security/ - Vendor Advisory () https://labcup.net/privacy-data-security/ - Vendor Advisory

Information

Published : 2021-06-10 16:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33031

Mitre link : CVE-2021-33031

CVE.ORG link : CVE-2021-33031


JSON object : View

Products Affected

labcup

  • labcup
CWE
CWE-862

Missing Authorization