| Título | z-9527 admin ≤ commit 72aaf2d Dynamically-Determined Object Attributes |
|---|
| Descripción | A mass assignment vulnerability exists in Z-9527 Admin ≤ commit 72aaf2d at the /user/update endpoint, where user-supplied parameters are directly iterated and incorporated into SQL UPDATE statements without field whitelisting. As a result, authenticated attackers can modify arbitrary database columns, including privilege-escalation fields such as isAdmin. Mitigations include implementing a strict whitelist of updatable fields, using an ORM with explicit field mapping, validating all input parameters against allowed attributes, separating privileged fields into admin-only update routes, and applying role-based access control before processing any update operations. |
|---|
| Fuente | ⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/z9527-admin/vulnerability-11 |
|---|
| Usuario | Anonymous User |
|---|
| Sumisión | 2026-03-16 04:37 (hace 22 días) |
|---|
| Moderación | 2026-03-31 18:11 (16 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 354441 [z-9527 admin 1.0/2.0 User Update Endpoint /server/routes/user.js isAdmin escalada de privilegios] |
|---|
| Puntos | 20 |
|---|