إرسال #625991: Open-Source LitmusChaos 3.19.0 Privilege Escalation via Manipulation of localStorageالمعلومات

عنوانOpen-Source LitmusChaos 3.19.0 Privilege Escalation via Manipulation of localStorage
الوصفA privilege escalation vulnerability was discovered in the LitmusChaos platform, where a user with Viewer-level permissions can elevate their privileges to Owner by tampering with the projectRole key stored in the browser’s localStorage. This manipulation is not validated by the backend, leading to unauthorized access to privileged functionality. During analysis, it was observed that user roles within a project are determined on the client side using a localStorage key named projectRole. By modifying this key’s value from "Viewer" to "Owner" using browser developer tools and reloading the page, the frontend updates to reflect elevated access rights. This change allows users to access Owner-only functionality, such as creating, modifying, or deleting experiments, without any backend verification of their actual role within the project. Impact Unauthorized privilege escalation Potential misuse or alteration of experiments and project configurations No server-side validation of user roles
المصدر⚠️ https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md
المستخدم
 maique (UID 88562)
ارسال31/07/2025 04:36 AM (9 أشهر منذ)
الاعتدال09/08/2025 07:34 AM (9 days later)
الحالةتمت الموافقة
إدخال VulDB319325 [LitmusChaos Litmus حتى 3.19.0 LocalStorage تجاوز الصلاحيات]
النقاط20

Want to know what is going to be exploited?

We predict KEV entries!