Description
A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the "Reset password" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 27 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adapt Authoring Tool
Adapt Authoring Tool adapt Authoring Tool |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:adapt_authoring_tool:adapt_authoring_tool:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Adapt Authoring Tool
Adapt Authoring Tool adapt Authoring Tool |
|
| Metrics |
cvssV3_1
|
Mon, 25 Nov 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the "Reset password" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-27T16:33:12.829Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-50672
Updated: 2024-11-27T16:32:44.069Z
Status : Received
Published: 2024-11-25T21:15:19.523
Modified: 2024-11-27T17:15:12.563
Link: CVE-2024-50672
No data.
OpenCVE Enrichment
No data.
Weaknesses