FKIE_CVE-2021-41325
Vulnerability from fkie_nvd - Published: 2021-09-30 19:15 - Updated: 2024-11-21 06:26
Severity ?
Summary
Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.)
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://charonv.net/Pydio-Broken-Access-Control/ | Third Party Advisory | |
| cve@mitre.org | https://github.com/pydio/cells/releases/tag/v2.2.12 | Release Notes, Third Party Advisory | |
| cve@mitre.org | https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212 | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://charonv.net/Pydio-Broken-Access-Control/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pydio/cells/releases/tag/v2.2.12 | Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212 | Product, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pydio:cells:2.2.9:*:*:*:-:*:*:*",
"matchCriteriaId": "944EE3E1-C64D-4C91-BE35-46E8D82F4D0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pydio:cells:2.2.9:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "09769712-BFE4-4A43-9DAB-0517CF86F941",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.)"
},
{
"lang": "es",
"value": "Un control de acceso roto para la creaci\u00f3n de usuarios en Pydio Cells versi\u00f3n 2.2.9, permite a usuarios an\u00f3nimos remotos crear usuarios est\u00e1ndar por medio del par\u00e1metro profile. (Adem\u00e1s, a estos usuarios se les puede conceder varios permisos de administrador por medio del par\u00e1metro Roles)"
}
],
"id": "CVE-2021-41325",
"lastModified": "2024-11-21T06:26:03.660",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-09-30T19:15:07.513",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://charonv.net/Pydio-Broken-Access-Control/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/pydio/cells/releases/tag/v2.2.12"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://charonv.net/Pydio-Broken-Access-Control/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/pydio/cells/releases/tag/v2.2.12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://pydio.com/fr/community/releases/pydio-cells/pydio-cells-enterprise-2212"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…