FKIE_CVE-2024-12305

Vulnerability from fkie_nvd - Published: 2024-12-09 09:15 - Updated: 2024-12-09 09:15
Summary
An object-level access control vulnerability in Unifiedtransform version 2.0 and potentially earlier versions allows unauthorized access to student grades. A malicious student user can view grades of other students by manipulating the student_id parameter in the marks viewing endpoint. The vulnerability exists due to insufficient access control checks in MarkController.php. At the time of publication of the CVE no patch is available.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An object-level access control vulnerability in Unifiedtransform version 2.0 and potentially earlier versions allows unauthorized access to student grades. A malicious student user can view grades of other students by manipulating the student_id parameter in the marks viewing endpoint. The vulnerability exists due to insufficient access control checks in MarkController.php. At the time of publication of the CVE no patch is available."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de control de acceso a nivel de objeto en Unifiedtransform versi\u00f3n 2.0 y posiblemente versiones anteriores permite el acceso no autorizado a las calificaciones de los estudiantes. Un usuario estudiante malintencionado puede ver las calificaciones de otros estudiantes manipulando el par\u00e1metro student_id en el punto de acceso de visualizaci\u00f3n de calificaciones. La vulnerabilidad existe debido a controles de acceso insuficientes en MarkController.php. En el momento de la publicaci\u00f3n de la CVE no hay ning\u00fan parche disponible."
    }
  ],
  "id": "CVE-2024-12305",
  "lastModified": "2024-12-09T09:15:04.970",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "vulnerability@ncsc.ch",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-09T09:15:04.970",
  "references": [
    {
      "source": "vulnerability@ncsc.ch",
      "url": "https://huntr.com/bounties/90a7299e-9233-43fd-b666-7375c4fdbb3c"
    }
  ],
  "sourceIdentifier": "vulnerability@ncsc.ch",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-639"
        }
      ],
      "source": "vulnerability@ncsc.ch",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…