Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).
References
Link | Resource |
---|---|
https://devnet.kentico.com/download/hotfixes | Release Notes Vendor Advisory |
https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-15T23:52:42
Updated: 2022-04-15T23:52:42
Reserved: 2022-04-15T00:00:00
Link: CVE-2022-29287
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-16T00:15:09.533
Modified: 2022-04-25T19:10:37.603
Link: CVE-2022-29287
JSON object: View
Redhat Information
No data.
CWE