Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the "id" parameter is replaced with the ID of another user.
History

Wed, 19 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
Description Sage DPW before 2024_12_001 is vulnerable to Incorrect Access Control. The implemented role-based access controls are not always enforced on the server side. Low-privileged Sage users with employee role privileges can create external courses for other employees, even though they do not have the option to do so in the user interface. To do this, a valid request to create a course simply needs to be modified, so that the current user ID in the "id" parameter is replaced with the ID of another user.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-18T00:00:00.000Z

Updated: 2025-02-19T15:04:31.165Z

Reserved: 2025-01-09T00:00:00.000Z

Link: CVE-2024-56883

cve-icon Vulnrichment

Updated: 2025-02-19T15:03:43.870Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-18T18:15:27.287

Modified: 2025-02-19T15:15:15.140

Link: CVE-2024-56883

cve-icon Redhat

No data.