Search criteria
1 vulnerability by curveballjs
CVE-2021-29452 (GCVE-0-2021-29452)
Vulnerability from cvelistv5 – Published: 2021-04-16 21:35 – Updated: 2024-08-03 22:02
VLAI?
Title
Any logged in user could edit any other logged in user.
Summary
a12n-server is an npm package which aims to provide a simple authentication system. A new HAL-Form was added to allow editing users in version 0.18.0. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. Patched in v0.18.2.
Severity ?
8.1 (High)
CWE
- CWE-269 - {"CWE-269":"Improper Privilege Management"}
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| curveball | a12n-server |
Affected:
>= 0.18 < 0.18.2
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:02:51.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.npmjs.com/package/%40curveball/a12n-server"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "a12n-server",
"vendor": "curveball",
"versions": [
{
"status": "affected",
"version": "\u003e= 0.18 \u003c 0.18.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "a12n-server is an npm package which aims to provide a simple authentication system. A new HAL-Form was added to allow editing users in version 0.18.0. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. Patched in v0.18.2."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "{\"CWE-269\":\"Improper Privilege Management\"}",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-04-16T21:35:15",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.npmjs.com/package/%40curveball/a12n-server"
}
],
"source": {
"advisory": "GHSA-8hw9-22v6-9jr9",
"discovery": "UNKNOWN"
},
"title": "Any logged in user could edit any other logged in user.",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-29452",
"STATE": "PUBLIC",
"TITLE": "Any logged in user could edit any other logged in user."
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "a12n-server",
"version": {
"version_data": [
{
"version_value": "\u003e= 0.18 \u003c 0.18.2"
}
]
}
}
]
},
"vendor_name": "curveball"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "a12n-server is an npm package which aims to provide a simple authentication system. A new HAL-Form was added to allow editing users in version 0.18.0. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. Patched in v0.18.2."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "{\"CWE-269\":\"Improper Privilege Management\"}"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9",
"refsource": "CONFIRM",
"url": "https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9"
},
{
"name": "https://www.npmjs.com/package/@curveball/a12n-server",
"refsource": "MISC",
"url": "https://www.npmjs.com/package/@curveball/a12n-server"
}
]
},
"source": {
"advisory": "GHSA-8hw9-22v6-9jr9",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2021-29452",
"datePublished": "2021-04-16T21:35:15",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:02:51.935Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}