portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html | Exploit Third Party Advisory VDB Entry |
https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-06-09T11:32:43
Updated: 2021-09-28T13:20:27
Reserved: 2021-06-09T00:00:00
Link: CVE-2021-34369
JSON object: View
NVD Information
Status : Modified
Published: 2021-06-09T12:15:08.033
Modified: 2024-05-17T01:58:14.640
Link: CVE-2021-34369
JSON object: View
Redhat Information
No data.
CWE