← Back to CVEs
CVE-2021-33031
LOW3.1
Description
In LabCup before <v2_next_18022, it is possible to use the save API to perform unauthorized actions for users without access to user management in order to, after successful exploitation, gain access to a victim's account. A user without the user-management privilege can change another user's email address if the attacker knows details of the victim such as the exact roles and group roles, ID, and remote authentication ID settings. These must be sent in a modified save API request. It was fixed in 6.3.0.03.
CVE Details
CVSS v3.1 Score3.1
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published6/10/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
labcup:labcup
Weaknesses (CWE)
CWE-862
References
https://labcup.net/privacy-data-security/(cve@mitre.org)
https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md(af854a3a-2127-422b-91ae-364da2661108)
https://labcup.net/privacy-data-security/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.