An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdeskintegration/saml/user/createorupdate endpoint, the /settings/guest-settings endpoint, the /settings/samlusers-settings endpoint, and the /settings/users-settings endpoint. A malicious user (already logged in as a SAML User) is able to achieve privilege escalation from a low-privilege user (FGM user) to an administrative user (GGU user), including the administrator, or create new users even without an admin role.
References
Link | Resource |
---|---|
https://www.gruppotim.it/it/footer/red-team.html | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-04-14T00:00:00
Updated: 2023-04-14T00:00:00
Reserved: 2022-11-11T00:00:00
Link: CVE-2022-45178
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-14T14:15:10.463
Modified: 2023-04-19T19:28:36.003
Link: CVE-2022-45178
JSON object: View
Redhat Information
No data.
CWE