CVE-2022-29287

Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).
Configurations

Configuration 1 (hide)

cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*

History

25 Apr 2022, 19:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.9
References (MISC) https://devnet.kentico.com/download/hotfixes - (MISC) https://devnet.kentico.com/download/hotfixes - Release Notes, Vendor Advisory
References (MISC) https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/ - (MISC) https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/ - Exploit, Third Party Advisory
CWE CWE-639
CPE cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
First Time Kentico
Kentico kentico

16 Apr 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-16 00:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-29287

Mitre link : CVE-2022-29287

CVE.ORG link : CVE-2022-29287


JSON object : View

Products Affected

kentico

  • kentico
CWE
CWE-639

Authorization Bypass Through User-Controlled Key