Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).
References
Link | Resource |
---|---|
https://devnet.kentico.com/download/hotfixes | Release Notes Vendor Advisory |
https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/ | Exploit Third Party Advisory |
https://devnet.kentico.com/download/hotfixes | Release Notes Vendor Advisory |
https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://devnet.kentico.com/download/hotfixes - Release Notes, Vendor Advisory | |
References | () https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/ - Exploit, Third Party Advisory |
Information
Published : 2022-04-16 00:15
Updated : 2024-11-21 06:58
NVD link : CVE-2022-29287
Mitre link : CVE-2022-29287
CVE.ORG link : CVE-2022-29287
JSON object : View
Products Affected
kentico
- kentico
CWE
CWE-639
Authorization Bypass Through User-Controlled Key