An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file.
References
Link | Resource |
---|---|
https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c | Exploit Third Party Advisory |
https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c | Third Party Advisory |
https://sunil-singh.notion.site/SeedDMS-6-0-15-Insecure-Direct-Object-Reference-IDOR-ff504354656b47b2b0cee0b7a82ad08c | Exploit Third Party Advisory |
https://www.notion.so/SeedDMS-6-0-15-Incorrect-Access-Control-ff504354656b47b2b0cee0b7a82ad08c | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-07 01:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33223
Mitre link : CVE-2021-33223
CVE.ORG link : CVE-2021-33223
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-639
Authorization Bypass Through User-Controlled Key