Filtered by vendor Tangro
Subscriptions
Filtered by product Business Workflow
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-26178 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 5.3 Medium |
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated. | ||||
CVE-2020-26177 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 4.3 Medium |
In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side. | ||||
CVE-2020-26176 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 4.3 Medium |
An issue was discovered in tangro Business Workflow before 1.18.1. No (or broken) access control checks exist on the /api/document/<DocumentID>/attachments API endpoint. Knowing a document ID, an attacker can list all the attachments of a workitem, including their respective IDs. This allows the attacker to gather valid attachment IDs for workitems that do not belong to them. | ||||
CVE-2020-26175 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 6.5 Medium |
In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users. | ||||
CVE-2020-26174 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 8.8 High |
tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. This allows an attacker to upload any file as an attachment to a workitem. | ||||
CVE-2020-26173 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 3.1 Low |
An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required. | ||||
CVE-2020-26172 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 4.2 Medium |
Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp. | ||||
CVE-2020-26171 | 1 Tangro | 1 Business Workflow | 2024-11-21 | 4.3 Medium |
In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them. |
Page 1 of 1.