Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed.
References
Link | Resource |
---|---|
https://www.systeam.com.br/cve/broken-access-control-en.txt | Vendor Advisory |
https://www.systeam.com.br/cve/broken-access-control-en.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.systeam.com.br/cve/broken-access-control-en.txt - Vendor Advisory |
Information
Published : 2021-12-21 17:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44877
Mitre link : CVE-2021-44877
CVE.ORG link : CVE-2021-44877
JSON object : View
Products Affected
dalmark
- systeam_enterprise_resource_planning
CWE