i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. Prior to the 2.9 branch, an attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions) through a specifically crafted POST request to `/intranet/educar_usuario_cad.php`, modifying the `nivel_usuario_` parameter. The vulnerability occurs in the file located at `ieducar/intranet/educar_usuario_cad.php`, which does not check the user's current permission level before allowing changes. Commit c25910cdf11ab50e50162a49dd44bef544422b6e contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-862 | |
Metrics |
cvssV3_1
|
Fri, 06 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. An attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions). Any user is capable of becoming an administrator, which can lead to account theft, changing administrative tasks, etc. The failure occurs in the file located in ieducar/intranet/educar_usuario_cad.php on line 446 , which does not perform checks on the user's current permission level to make changes. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule. | i-Educar is free, fully online school management software that can be used by school secretaries, teachers, coordinators, and area managers. Prior to the 2.9 branch, an attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions) through a specifically crafted POST request to `/intranet/educar_usuario_cad.php`, modifying the `nivel_usuario_` parameter. The vulnerability occurs in the file located at `ieducar/intranet/educar_usuario_cad.php`, which does not check the user's current permission level before allowing changes. Commit c25910cdf11ab50e50162a49dd44bef544422b6e contains a patch for the issue. |
References |
|
Wed, 28 Aug 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Portabilis
Portabilis i-educar |
|
CPEs | cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:* | |
Vendors & Products |
Portabilis
Portabilis i-educar |
|
Metrics |
ssvc
|
Wed, 28 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | i-Educar is free, completely online school management software that allows school secretaries, teachers, coordinators and area managers. An attacker with only minimal viewing privileges in the settings section is able to change their user type to Administrator (or another type with super-permissions). Any user is capable of becoming an administrator, which can lead to account theft, changing administrative tasks, etc. The failure occurs in the file located in ieducar/intranet/educar_usuario_cad.php on line 446 , which does not perform checks on the user's current permission level to make changes. This issue has not yet been patched. Users are advised to contact the developer and to coordinate an update schedule. | |
Title | Privilege escalation in i-Educar | |
Weaknesses | CWE-20 CWE-269 |
|
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-28T20:17:30.179Z
Updated: 2024-09-06T19:25:03.651Z
Reserved: 2024-08-21T17:53:51.333Z
Link: CVE-2024-45058
Vulnrichment
Updated: 2024-08-28T20:33:44.224Z
NVD
Status : Analyzed
Published: 2024-08-28T21:15:07.283
Modified: 2024-09-13T20:06:33.193
Link: CVE-2024-45058
Redhat
No data.