| Titel | z-9527 admin ≤ commit 72aaf2d Dynamically-Determined Object Attributes |
|---|
| Beschreibung | A mass assignment vulnerability exists in Z-9527 Admin ≤ commit 72aaf2d at the /user/update endpoint, where user-supplied parameters are directly iterated and incorporated into SQL UPDATE statements without field whitelisting. As a result, authenticated attackers can modify arbitrary database columns, including privilege-escalation fields such as isAdmin. Mitigations include implementing a strict whitelist of updatable fields, using an ORM with explicit field mapping, validating all input parameters against allowed attributes, separating privileged fields into admin-only update routes, and applying role-based access control before processing any update operations. |
|---|
| Quelle | ⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/z9527-admin/vulnerability-11 |
|---|
| Benutzer | Anonymous User |
|---|
| Einreichung | 16.03.2026 04:37 (vor 19 Tagen) |
|---|
| Moderieren | 31.03.2026 18:11 (16 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 354441 [z-9527 admin 1.0/2.0 User Update Endpoint /server/routes/user.js isAdmin erweiterte Rechte] |
|---|
| Punkte | 20 |
|---|