An issue was discovered in Telexy QPath 5.4.462. A low privileged authenticated user supplying a specially crafted serialized request to AdanitDataService.svc may modify user information, including but not limited to email address, username, and password, of other user accounts. The simplest attack approach is for the attacker to intercept their own password-change request and modify the username before the request reaches the server. Also, changing a victim's email address can have a similar account-takeover consequence.
References
Link | Resource |
---|---|
https://www.dropbox.com/s/6tlee2uj3t3su8n/Telexy-QPath-CVE-2018-7718.pdf | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-11-08T21:00:00
Updated: 2018-11-08T20:57:01
Reserved: 2018-03-05T00:00:00
Link: CVE-2018-7718
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-11-08T21:29:00.200
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-7718
JSON object: View
Redhat Information
No data.
CWE