Ametys before 4.0.3 requires authentication only for URIs containing a /cms/ substring, which allows remote attackers to bypass intended access restrictions via a direct request to /plugins/core-ui/servercomm/messages.xml, as demonstrated by changing the admin password by obtaining account details via a users/search.json request, and then modifying the account via an editUser request.
References
Link Resource
https://blogs.securiteam.com/index.php/archives/3517 Exploit Technical Description Third Party Advisory
https://issues.ametys.org/browse/RUNTIME-2582 Issue Tracking Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-11-24T07:00:00

Updated: 2017-11-24T07:57:01

Reserved: 2017-11-24T00:00:00


Link: CVE-2017-16935

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-11-24T07:29:00.303

Modified: 2019-10-03T00:03:26.223


Link: CVE-2017-16935

JSON object: View

cve-icon Redhat Information

No data.

CWE