Soumettre #625984: Open-Source LitmusChaos 3.19.0 Broken Access Control via Login Response Manipulationinformation

TitreOpen-Source LitmusChaos 3.19.0 Broken Access Control via Login Response Manipulation
DescriptionA broken access control vulnerability was identified in the LitmusChaos platform, where a user can gain unauthorized access to another user's project by manipulating the projectID returned in the response of the /auth/login endpoint. This flaw results from excessive trust in client-side data and a lack of server-side validation after authentication. Details Upon successful authentication, the /auth/login response includes a list of accessible project IDs and the user's role for each. This information is stored on the client side and is used by the frontend to determine access and visibility to projects. However, by intercepting and modifying this response, specifically the projectID value, a malicious user can inject unauthorized project references. The backend fails to verify whether the user truly has access to the referenced project, thus allowing privilege escalation and access to resources beyond their scope. This weakness violates the principle of secure-by-default access control and exposes internal project data across user boundaries.
La source⚠️ https://github.com/MaiqueSilva/VulnDB/blob/main/readme05.md
Utilisateur
 maique (UID 88562)
Soumission31/07/2025 04:19 (il y a 9 mois)
Modérer09/08/2025 07:34 (9 days later)
StatutAccepté
Entrée VulDB319323 [LitmusChaos Litmus jusqu’à 3.19.0 /auth/login projectID élévation de privilèges]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!