An authorization bypass vulnerability in pinboard updates in ThoughtSpot 4.4.1 through 5.1.1 (before 5.1.2) allows a low-privilege user with write access to at least one pinboard to corrupt pinboards of another user in the application by spoofing GUIDs in pinboard update requests, effectively deleting them.
References
| Link | Resource |
|---|---|
| https://docs.thoughtspot.com/5.1/release/notes.html | Release Notes Vendor Advisory |
| https://www.vsecurity.com/download/advisories/201912782-1.txt | Third Party Advisory |
| https://www.vsecurity.com/resources/advisories.html | Third Party Advisory |
Configurations
Information
Published : 2019-07-09 09:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-12782
Mitre link : CVE-2019-12782
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
thoughtspot
- thoughtspot


