Enable exports of the database and associated exported information of the system via the default user role. The attacked would have to have been granted access to the system prior to the attack. It is worth noting that the deterministic nature of the export name is lower risk as the UI for exporting would start the download at the same time, which once downloaded - deletes the export from the system. The endpoint for exporting should simply be patched to a higher privilege level.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-02-27T14:07:28.927Z

Updated: 2024-08-01T18:23:28.766Z

Reserved: 2024-01-15T01:10:32.762Z

Link: CVE-2024-0551

cve-icon Vulnrichment

Updated: 2024-08-01T18:11:35.064Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-27T14:15:27.130

Modified: 2024-02-27T14:19:41.650

Link: CVE-2024-0551

cve-icon Redhat

No data.