CVE-2021-33223

An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:seeddms:seeddms:6.0.15:*:*:*:*:*:*:*

History

15 Jun 2023, 18:22

Type Values Removed Values Added
CWE CWE-639
First Time Seeddms
Seeddms seeddms
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c - (MISC) https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c - Third Party Advisory
References (MISC) https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c - (MISC) https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c - Exploit, Third Party Advisory
CPE cpe:2.3:a:seeddms:seeddms:6.0.15:*:*:*:*:*:*:*

07 Jun 2023, 02:45

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-07 01:15

Updated : 2024-02-28 20:13


NVD link : CVE-2021-33223

Mitre link : CVE-2021-33223

CVE.ORG link : CVE-2021-33223


JSON object : View

Products Affected

seeddms

  • seeddms
CWE
CWE-639

Authorization Bypass Through User-Controlled Key