In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.
References
Link | Resource |
---|---|
https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111 | Third Party Advisory |
https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b - Patch, Third Party Advisory | |
References | () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111 - Third Party Advisory |
Information
Published : 2022-01-05 15:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22111
Mitre link : CVE-2022-22111
CVE.ORG link : CVE-2022-22111
JSON object : View
Products Affected
daybydaycrm
- daybyday_crm
CWE
CWE-862
Missing Authorization