ghsa-3hfj-qcvj-4hx8
Vulnerability from github
Published
2025-02-21 23:53
Modified
2025-02-21 23:53
Severity ?
Summary
Leantime has Missing Authorization Check for Host Parameter
Details
Finding Description
Application has functionality for a user to view profile information. It does not have an implemented authorization check for "Host" parameter which allows a user to view profile information of another user by replacing "Host" parameter.
Impact
By exploiting this vulnerability an attacker can able to view profile information (but not anything else or change anything)
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "leantime/leantime" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [], "database_specific": { "cwe_ids": [ "CWE-862" ], "github_reviewed": true, "github_reviewed_at": "2025-02-21T23:53:22Z", "nvd_published_at": null, "severity": "LOW" }, "details": "### Finding Description\nApplication has functionality for a user to view profile information. It does not have an implemented authorization check for \"Host\" parameter which allows a user to view profile information of another user by replacing \"Host\" parameter.\n\n### Impact\nBy exploiting this vulnerability an attacker can able to view profile information (but not anything else or change anything)", "id": "GHSA-3hfj-qcvj-4hx8", "modified": "2025-02-21T23:53:22Z", "published": "2025-02-21T23:53:22Z", "references": [ { "type": "WEB", "url": "https://github.com/Leantime/leantime/security/advisories/GHSA-3hfj-qcvj-4hx8" }, { "type": "PACKAGE", "url": "https://github.com/Leantime/leantime" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Leantime has Missing Authorization Check for Host Parameter" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.