CVE-2022-45178

An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdeskintegration/saml/user/createorupdate endpoint, the /settings/guest-settings endpoint, the /settings/samlusers-settings endpoint, and the /settings/users-settings endpoint. A malicious user (already logged in as a SAML User) is able to achieve privilege escalation from a low-privilege user (FGM user) to an administrative user (GGU user), including the administrator, or create new users even without an admin role.
References
Link Resource
https://www.gruppotim.it/it/footer/red-team.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*

History

19 Apr 2023, 19:28

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References (MISC) https://www.gruppotim.it/it/footer/red-team.html - (MISC) https://www.gruppotim.it/it/footer/red-team.html - Exploit, Third Party Advisory
First Time Liveboxcloud vdesk
Liveboxcloud
CPE cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

14 Apr 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-14 14:15

Updated : 2023-12-10 15:01


NVD link : CVE-2022-45178

Mitre link : CVE-2022-45178

CVE.ORG link : CVE-2022-45178


JSON object : View

Products Affected

liveboxcloud

  • vdesk