Loading HuntDB...

User automatically logged in as Sys Admin user on https://███/Administration/Administration.aspx

Critical
U
U.S. Dept Of Defense
Submitted None
Reported by mrr0b0t2324

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
**Description:** Any user can access the Administration section of the following URL: https://███ When the user goes to the following domain they are automatically logged in as "████████" which is a sys admin user on the application, this allows any user to upload files, add users, change permissions for users and delete users. ## References ## Impact A malicious actor can modify other user's privileges on the application, add users, upload files, delete users. They can also add false information to the application which will jeopardize the integrity of the application. With administrator privileges they have no restrictions on the application. ## System Host(s) https://█████████ ## Affected Product(s) and Version(s) ## CVE Numbers ## Steps to Reproduce Step 1) Go to the following URL: https://███ There you will se that you are logged in as a Sys Admin user ## Suggested Mitigation/Remediation Actions The application should prompt a user to authenticate first before being able to do any other actions on the system.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic