Ametys before 4.0.3 requires authentication only for URIs containing a /cms/ substring, which allows remote attackers to bypass intended access restrictions via a direct request to /plugins/core-ui/servercomm/messages.xml, as demonstrated by changing the admin password by obtaining account details via a users/search.json request, and then modifying the account via an editUser request.
References
Link | Resource |
---|---|
https://blogs.securiteam.com/index.php/archives/3517 | Exploit Technical Description Third Party Advisory |
https://issues.ametys.org/browse/RUNTIME-2582 | Issue Tracking Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-11-24T07:00:00
Updated: 2017-11-24T07:57:01
Reserved: 2017-11-24T00:00:00
Link: CVE-2017-16935
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-11-24T07:29:00.303
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-16935
JSON object: View
Redhat Information
No data.
CWE