In Eigen NLP 3.10.1, a lack of access control on the /auth/v1/user/{user-guid}/ user edition endpoint could permit any logged-in user to increase their own permissions via a user_permissions array in a PATCH request. A guest user could modify other users' profiles and much more.
References
Link | Resource |
---|---|
https://eigentech.com/ | Vendor Advisory |
https://excellium-services.com/cert-xlm-advisory/ | Third Party Advisory |
https://excellium-services.com/cert-xlm-advisory/CVE-2021-38616 | Third Party Advisory |
Configurations
Information
Published : 2021-09-07 05:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-38616
Mitre link : CVE-2021-38616
JSON object : View
CWE
Products Affected
eigentech
- natural_language_processing