vendor:
SpagoBI
by:
Christian Catalano
8,8
CVSS
HIGH
Input Manipulation
287
CWE
Product Name: SpagoBI
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: CVE-2013-6231
CPE: a:engineering_group:spagobi
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013
Remote Privilege Escalation in SpagoBI
SpagoBI contains a flaw that leads to unauthorized privileges being gained. The issue is triggered when the servlet (action): AdapterHTTP?ACTION_NAME=MANAGE_USER_ACTION is executed with specifically crafted input, and may allow a remote attacker to gain Administrator role privileges. An attacker (a SpagoBI malicious Business User with RSM role ) can invoke via URL the servlet (action): AdapterHTTP?ACTION_NAME=MANAGE_USER_ACTION to gain SpagoBI Administrator privilege.
Mitigation:
Restrict access to the servlet (action): AdapterHTTP?ACTION_NAME=MANAGE_USER_ACTION