CVE-2021-33031

In LabCup before <v2_next_18022, it is possible to use the save API to perform unauthorized actions for users without access to user management in order to, after successful exploitation, gain access to a victim's account. A user without the user-management privilege can change another user's email address if the attacker knows details of the victim such as the exact roles and group roles, ID, and remote authentication ID settings. These must be sent in a modified save API request. It was fixed in 6.3.0.03.
Configurations

Configuration 1 (hide)

cpe:2.3:a:labcup:labcup:*:*:*:*:*:*:*:*

History

22 Jun 2021, 18:29

Type Values Removed Values Added
CWE CWE-862
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 3.1
CPE cpe:2.3:a:labcup:labcup:*:*:*:*:*:*:*:*
References (MISC) https://labcup.net/privacy-data-security/ - (MISC) https://labcup.net/privacy-data-security/ - Vendor Advisory
References (MISC) https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md - (MISC) https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md - Third Party Advisory

10 Jun 2021, 16:28

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-10 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-33031

Mitre link : CVE-2021-33031

CVE.ORG link : CVE-2021-33031


JSON object : View

Products Affected

labcup

  • labcup
CWE
CWE-862

Missing Authorization