| Título | KodExplorer 4.52 Authorization Bypass |
|---|
| Descripción | KodExplorer v4.52 contains a post-authentication authorization bypass in systemRole/get that allows a low-privilege user to modify global group permission templates. By abusing the group_role parameter, an attacker can overwrite the built-in read-only template and add write permissions such as write:add. Once the template is changed, ordinary users assigned to public groups with read-only membership are immediately granted write access and can create files in shared locations. This results in a real privilege escalation and global ACL corruption rather than a simple interface flaw.
|
|---|
| Fuente | ⚠️ https://vulnplus-note.wetolink.com/share/atu3UbqnfAgs |
|---|
| Usuario | vulnplusbot (UID 96250) |
|---|
| Sumisión | 2026-03-26 11:15 (hace 24 días) |
|---|
| Moderación | 2026-04-18 21:07 (23 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 358205 [kodcloud KodExplorer hasta 4.52 systemRole.class.php roleGroupAction group_role escalada de privilegios] |
|---|
| Puntos | 20 |
|---|