CVE-2021-42791

An issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push notifications for any other user. The text contained in the push notification can also be modified. If a user who receives the notification accepts it, then the user who triggered the notification can obtain the accepting user's login certificate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:veridiumid:veridiumad:2.5.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () https://www.compass-security.com/en/research/advisories - Third Party Advisory () https://www.compass-security.com/en/research/advisories - Third Party Advisory
References () https://www.compass-security.com/fileadmin/Research/Advisories/2022_03_CSNC-2021-017_VeridiumId_Broken_Access_Control.txt - Third Party Advisory () https://www.compass-security.com/fileadmin/Research/Advisories/2022_03_CSNC-2021-017_VeridiumId_Broken_Access_Control.txt - Third Party Advisory
References () https://www.veridiumid.com/press/veridium-eliminates-passwords-with-veridiumad-for-enterprises-using-microsoft-active-directory/ - Product, Vendor Advisory () https://www.veridiumid.com/press/veridium-eliminates-passwords-with-veridiumad-for-enterprises-using-microsoft-active-directory/ - Product, Vendor Advisory

Information

Published : 2022-01-28 13:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-42791

Mitre link : CVE-2021-42791

CVE.ORG link : CVE-2021-42791


JSON object : View

Products Affected

veridiumid

  • veridiumad
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')