Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wm5j-9gpp-rpj9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Kronos Web Time and Attendance (webTA) 3.8.x and later 3.x versions before 4.0, the com.threeis.webta.H402editUser servlet allows an attacker with Timekeeper, Master Timekeeper, or HR Admin privileges to gain unauthorized administrative privileges within the application via the emp_id, userid, pw1, pw2, supervisor, and timekeeper parameters.

In Kronos Web Time and Attendance (webTA) 3.8.x and later 3.x versions before 4.0, the com.threeis.webta.H402editUser servlet allows an attacker with Timekeeper, Master Timekeeper, or HR Admin privileges to gain unauthorized administrative privileges within the application via the emp_id, userid, pw1, pw2, supervisor, and timekeeper parameters.

EPSS

Процентиль: 66%
0.00525
Низкий

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 8.8
nvd
около 6 лет назад

In Kronos Web Time and Attendance (webTA) 3.8.x and later 3.x versions before 4.0, the com.threeis.webta.H402editUser servlet allows an attacker with Timekeeper, Master Timekeeper, or HR Admin privileges to gain unauthorized administrative privileges within the application via the emp_id, userid, pw1, pw2, supervisor, and timekeeper parameters.

EPSS

Процентиль: 66%
0.00525
Низкий

Дефекты

CWE-269