An issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push notifications for any other user. The text contained in the push notification can also be modified. If a user who receives the notification accepts it, then the user who triggered the notification can obtain the accepting user's login certificate.
References
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.compass-security.com/en/research/advisories - Third Party Advisory | |
References | () https://www.compass-security.com/fileadmin/Research/Advisories/2022_03_CSNC-2021-017_VeridiumId_Broken_Access_Control.txt - Third Party Advisory | |
References | () https://www.veridiumid.com/press/veridium-eliminates-passwords-with-veridiumad-for-enterprises-using-microsoft-active-directory/ - Product, Vendor Advisory |
Information
Published : 2022-01-28 13:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-42791
Mitre link : CVE-2021-42791
CVE.ORG link : CVE-2021-42791
JSON object : View
Products Affected
veridiumid
- veridiumad
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')