An issue was discovered in VeridiumID VeridiumAD 2.5.3.0. The HTTP request to trigger push notifications for VeridiumAD enrolled users does not enforce proper access control. A user can trigger push notifications for any other user. The text contained in the push notification can also be modified. If a user who receives the notification accepts it, then the user who triggered the notification can obtain the accepting user's login certificate.
References
Link | Resource |
---|---|
https://www.veridiumid.com/press/veridium-eliminates-passwords-with-veridiumad-for-enterprises-using-microsoft-active-directory/ | Product Vendor Advisory |
https://www.compass-security.com/en/research/advisories | Third Party Advisory |
https://www.compass-security.com/fileadmin/Research/Advisories/2022_03_CSNC-2021-017_VeridiumId_Broken_Access_Control.txt | Third Party Advisory |
Configurations
Information
Published : 2022-01-28 05:15
Updated : 2022-02-02 10:25
NVD link : CVE-2021-42791
Mitre link : CVE-2021-42791
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
veridiumid
- veridiumad