** DISPUTED ** portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value. NOTE: the vendor states "the information that is being queried is authorized for an authenticated user of that application, so we consider this not applicable."
References
Link | Resource |
---|---|
https://gist.github.com/0xx7/58943bb6e9ef77a09d3c7eb00dcafdc7 | Third Party Advisory |
http://packetstormsecurity.com/files/163116/Accela-Civic-Platform-21.1-Insecure-Direct-Object-Reference.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2021-06-09 05:15
Updated : 2021-10-18 04:52
NVD link : CVE-2021-34369
Mitre link : CVE-2021-34369
JSON object : View
CWE
Products Affected
accela
- civic_platform