Lucene search

K
githubGitHub Advisory DatabaseGHSA-36CM-H8GV-MG97
HistoryMay 19, 2023 - 6:30 p.m.

RosarioSIS Stores Sensitive Data in a Mechanism without Access Control

2023-05-1918:30:25
CWE-921
CWE-922
GitHub Advisory Database
github.com
16
rosariosis
sensitive data
access control
unauthorized access
file attachments
salaries module
data format
automated tools
security patch

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

44.8%

RosarioSIS prior to 11.0 allows anyone, regardless of authentication status, to download and view file attachments under the salaries module. In addition, the file names contain a date in a YYYY-MM-DD format and a random six-string digit, making enumerating file names with automated tools relatively easy. This could allow an attacker to gain access to sensitive salary information. The patch for version 11.0 adds microseconds to filenames to make them harder to guess.

Affected configurations

Vulners
Node
francoisjacquetrosariosisRange<11.0
CPENameOperatorVersion
francoisjacquet/rosariosislt11.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

44.8%

Related for GHSA-36CM-H8GV-MG97