CVE-2021-34369

portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:35

Type Values Removed Values Added
Summary ** DISPUTED ** portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable." portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable.

18 Oct 2021, 11:52

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html - Third Party Advisory (MISC) http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html - Exploit, Third Party Advisory, VDB Entry

28 Sep 2021, 14:15

Type Values Removed Values Added
Summary portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. ** DISPUTED ** portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable."

16 Jun 2021, 18:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*
References (MISC) http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html - (MISC) http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html - Third Party Advisory
References (MISC) https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 - (MISC) https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 - Third Party Advisory

14 Jun 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html -

09 Jun 2021, 12:38

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 12:15

Updated : 2024-04-11 01:11


NVD link : CVE-2021-34369

Mitre link : CVE-2021-34369

CVE.ORG link : CVE-2021-34369


JSON object : View

Products Affected

accela

  • civic_platform