Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gpvh-xcx4-jwmg

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

IBM LoopBack (IBM API Connect 2018.1, 2018.4.1, 5.0.8.0, and 5.0.8.4) could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, it is then possible for anyone to create an AccessToken for any User provided they know the userId and can hence get access to the other user�s data / access to their privileges (if the user happens to be an Admin for example). IBM X-Force ID: 148801.

IBM LoopBack (IBM API Connect 2018.1, 2018.4.1, 5.0.8.0, and 5.0.8.4) could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, it is then possible for anyone to create an AccessToken for any User provided they know the userId and can hence get access to the other user�s data / access to their privileges (if the user happens to be an Admin for example). IBM X-Force ID: 148801.

EPSS

Процентиль: 57%
0.00349
Низкий

8.1 High

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 7.7
nvd
около 7 лет назад

IBM LoopBack (IBM API Connect 2018.1, 2018.4.1, 5.0.8.0, and 5.0.8.4) could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, it is then possible for anyone to create an AccessToken for any User provided they know the userId and can hence get access to the other user’s data / access to their privileges (if the user happens to be an Admin for example). IBM X-Force ID: 148801.

EPSS

Процентиль: 57%
0.00349
Низкий

8.1 High

CVSS3

Дефекты

CWE-287