Jamf Pro 10.x before 10.3.0 has Incorrect Access Control. Jamf Pro user accounts and groups with access to log in to Jamf Pro had full access to endpoints in the Universal API (UAPI), regardless of account privileges or privilege sets. An authenticated Jamf Pro account without required privileges could be used to perform CRUD actions (GET, POST, PUT, DELETE) on UAPI endpoints, which could result in unauthorized information disclosure, compromised data integrity, and data loss. For a full listing of available UAPI endpoints and associated CRUD actions you can navigate to /uapi/doc in your instance of Jamf Pro.
References
Link | Resource |
---|---|
https://docs.jamf.com/10.3.0/jamf-pro/release-notes/Bug_Fixes_and_Enhancements.html | Vendor Advisory |
Configurations
Information
Published : 2020-01-07 11:15
Updated : 2020-08-24 10:37
NVD link : CVE-2018-10465
Mitre link : CVE-2018-10465
JSON object : View
CWE
Products Affected
jamf
- jamf