Pitchfork version 1.4.6 RC1 contains an Improper Privilege Management vulnerability in Trident Pitchfork components that can result in A standard unprivileged user could gain system administrator permissions within the web portal.. This attack appear to be exploitable via The user must be able to login, and could edit their profile and set the "System Administrator" permission to "yes" on themselves.. This vulnerability appears to have been fixed in 1.4.6 RC2.
References
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tridentli/pitchfork/commit/33549f15707801099e1253dd5e79369bd48eb59b - Patch, Third Party Advisory | |
References | () https://github.com/tridentli/pitchfork/commit/9fd07cbe4f93e1367e142016e9a205366680dd54 - Patch, Third Party Advisory | |
References | () https://github.com/tridentli/pitchfork/issues/168 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/tridentli/trident/releases/tag/DEV_1.4.6-RC2 - Third Party Advisory | |
References | () https://thomas-ward.net/security-advisories/trident-trusted-communications-platform-privilege-escalation-issue-advisory/ - Third Party Advisory |
Information
Published : 2018-03-16 14:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000133
Mitre link : CVE-2018-1000133
CVE.ORG link : CVE-2018-1000133
JSON object : View
Products Affected
secluded
- trident
CWE
CWE-269
Improper Privilege Management