An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them.
References
Link | Resource |
---|---|
https://docs.thoughtspot.com/5.1/release/notes.html | Release Notes Vendor Advisory |
https://www.vsecurity.com/download/advisories/201912782-1.txt | Third Party Advisory |
https://www.vsecurity.com/resources/advisories.html | Third Party Advisory |
Configurations
Information
Published : 2019-07-09 09:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-12782
Mitre link : CVE-2019-12782
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
thoughtspot
- thoughtspot