| |
Vulnerability CVE-2020-11680
Published: 2020-06-04
Description: |
Castel NextGen DVR v1.0.0 is vulnerable to authorization bypass on all administrator functionality. The application fails to check that a request was submitted by an administrator. Consequently, a normal user can perform actions including, but not limited to, creating/modifying the file store, creating/modifying alerts, creating/modifying users, etc. |
See advisories in our WLB2 database: | Topic | Author | Date |
Low |
| Aaron Bishop | 06.06.2020 |
Type:
CWE-863 (Incorrect Authorization)
CVSS2 => (AV:N/AC:L/Au:S/C:N/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
4/10 |
2.9/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
None |
References: |
http://packetstormsecurity.com/files/157954/Castel-NextGen-DVR-1.0.0-Bypass-CSRF-Disclosure.html
http://seclists.org/fulldisclosure/2020/Jun/8
https://www.securitymetrics.com/blog/attackers-known-unknown-authorization-bypass
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|