TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Testlink
Testlink testlink |
|
Weaknesses | CWE-284 | |
CPEs | cpe:2.3:a:testlink:testlink:1.9.20:*:*:*:*:*:*:* | |
Vendors & Products |
Testlink
Testlink testlink |
|
Metrics |
cvssV3_1
|
Fri, 27 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-27T00:00:00
Updated: 2024-09-27T19:42:29.536Z
Reserved: 2024-09-11T00:00:00
Link: CVE-2024-46097
Vulnrichment
Updated: 2024-09-27T19:17:55.744Z
NVD
Status : Awaiting Analysis
Published: 2024-09-27T18:15:05.687
Modified: 2024-09-30T12:45:57.823
Link: CVE-2024-46097
Redhat
No data.