Due to missing authorization checks, any authenticated user is able to list, upload, or delete attachments to password safe entries in Pleasant Password Server before 7.8.3. To perform those actions on an entry, the user needs to know the corresponding "CredentialId" value, which uniquely identifies a password safe entry. Since "CredentialId" values are implemented as GUIDs, they are hard to guess. However, if for example an entry's owner grants read-only access to a malicious user, the value gets exposed to the malicious user. The same holds true for temporary grants.
References
Link Resource
https://www.profundis-labs.com/advisories/CVE-2017-17707.txt Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-07-31T14:00:00

Updated: 2018-07-31T13:57:01

Reserved: 2017-12-15T00:00:00


Link: CVE-2017-17707

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-07-31T14:29:00.293

Modified: 2019-10-03T00:03:26.223


Link: CVE-2017-17707

JSON object: View

cve-icon Redhat Information

No data.

CWE