Description
In Eigen NLP 3.10.1, a lack of access control on the /auth/v1/user/{user-guid}/ user edition endpoint could permit any logged-in user to increase their own permissions via a user_permissions array in a PATCH request. A guest user could modify other users' profiles and much more.
References
Vendor Advisory
https://excellium-services.com/cert-xlm-advisory/
Third Party Advisory
https://excellium-services.com/cert-xlm-advisory/CVE-2021-38616
Third Party Advisory
Vendor Advisory
https://excellium-services.com/cert-xlm-advisory/
Third Party Advisory
https://excellium-services.com/cert-xlm-advisory/CVE-2021-38616
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
7.6 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-09-07T10:15:07.827Z
4 years agoLast modified
2025-05-30T14:15:28.450Z
7 months ago