The user_token authorization header on the Ourphoto App version 1.4.1 /apiv1/* end-points is not implemented properly. Removing the value causes all requests to succeed, bypassing authorization and session management. The impact of this vulnerability allows an attacker POST api calls with other users unique identifiers and enumerate information of all other end-users.
References
Link | Resource |
---|---|
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2022-11-28 22:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-24189
Mitre link : CVE-2022-24189
CVE.ORG link : CVE-2022-24189
JSON object : View
Products Affected
sz-fujia
- ourphoto
CWE
CWE-863
Incorrect Authorization