Soumettre #778530: BichitroGan ISP Billing Software 2025.3.20 Insecure Direct Object Reference (IDOR) / Broken Access Controlinformation

TitreBichitroGan ISP Billing Software 2025.3.20 Insecure Direct Object Reference (IDOR) / Broken Access Control
DescriptionAn Insecure Direct Object Reference (IDOR) vulnerability exists in the BichitroGan ISP Billing Software version 2025.3.20. The endpoint: ?_route=settings/users-view/{id} does not properly validate user authorization. A low-privileged authenticated user (such as a Sales role) can manipulate the user ID parameter to access other users' account information, including administrative accounts. By changing the numeric ID in the URL, attackers can enumerate users and retrieve sensitive account information without proper authorization checks. Example: https://demo.bichitrogan.com/?_route=settings/users-view/4 Impact: • Unauthorized access to user information • Exposure of administrator account details • User enumeration • Potential reconnaissance for privilege escalation The vulnerability occurs due to missing server-side access control validation on the user profile endpoint.
La source⚠️ https://github.com/4m3rr0r/PoCVulDb/issues/15
Utilisateur
 4m3rr0r (UID 85795)
Soumission12/03/2026 10:15 (il y a 17 jours)
Modérer27/03/2026 17:06 (15 days later)
StatutAccepté
Entrée VulDB353953 [BichitroGan ISP Billing Software 2025.3.20 Endpoint users-view ID élévation de privilèges]
Points20

Want to know what is going to be exploited?

We predict KEV entries!