TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges.
History

Fri, 27 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Testlink
Testlink testlink
Weaknesses CWE-284
CPEs cpe:2.3:a:testlink:testlink:1.9.20:*:*:*:*:*:*:*
Vendors & Products Testlink
Testlink testlink
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Description TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-27T00:00:00

Updated: 2024-09-27T19:42:29.536Z

Reserved: 2024-09-11T00:00:00

Link: CVE-2024-46097

cve-icon Vulnrichment

Updated: 2024-09-27T19:17:55.744Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-27T18:15:05.687

Modified: 2024-09-30T12:45:57.823

Link: CVE-2024-46097

cve-icon Redhat

No data.