portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html | Exploit Third Party Advisory VDB Entry |
https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 | Third Party Advisory |
http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html | Exploit Third Party Advisory VDB Entry |
https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 - Third Party Advisory |
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
Summary | portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable. |
Information
Published : 2021-06-09 12:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34369
Mitre link : CVE-2021-34369
CVE.ORG link : CVE-2021-34369
JSON object : View
Products Affected
accela
- civic_platform
CWE