An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file.
Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.
Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 22 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 22 Apr 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file. Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly. | |
Title | Replace uploaded files knowing the file upload ID | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2025-04-22T18:55:44.071Z
Reserved: 2025-04-11T14:18:18.443Z
Link: CVE-2025-3519

Updated: 2025-04-22T18:55:38.847Z

Status : Awaiting Analysis
Published: 2025-04-22T09:15:15.660
Modified: 2025-04-23T14:08:13.383
Link: CVE-2025-3519

No data.

No data.