An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them.
References
| Link | Resource |
|---|---|
| https://docs.thoughtspot.com/5.1/release/notes.html | Release Notes Vendor Advisory |
| https://www.vsecurity.com/download/advisories/201912782-1.txt | Third Party Advisory |
| https://www.vsecurity.com/resources/advisories.html | Third Party Advisory |
| https://docs.thoughtspot.com/5.1/release/notes.html | Release Notes Vendor Advisory |
| https://www.vsecurity.com/download/advisories/201912782-1.txt | Third Party Advisory |
| https://www.vsecurity.com/resources/advisories.html | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-07-09 16:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12782
Mitre link : CVE-2019-12782
CVE.ORG link : CVE-2019-12782
JSON object : View
Products Affected
thoughtspot
- thoughtspot
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
