Vulnerabilities (CVE)

Filtered by vendor Tangro Subscribe
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-26178 1 Tangro 1 Business Workflow 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
CVE-2020-26177 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side.
CVE-2020-26176 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in tangro Business Workflow before 1.18.1. No (or broken) access control checks exist on the /api/document/<DocumentID>/attachments API endpoint. Knowing a document ID, an attacker can list all the attachments of a workitem, including their respective IDs. This allows the attacker to gather valid attachment IDs for workitems that do not belong to them.
CVE-2020-26175 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.
CVE-2020-26174 1 Tangro 1 Business Workflow 2024-11-21 6.5 MEDIUM 8.8 HIGH
tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. This allows an attacker to upload any file as an attachment to a workitem.
CVE-2020-26173 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 3.1 LOW
An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.
CVE-2020-26172 1 Tangro 1 Business Workflow 2024-11-21 6.4 MEDIUM 4.2 MEDIUM
Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.
CVE-2020-26171 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.