| Titre | KodExplorer 4.52 Authorization Bypass |
|---|
| Description | KodExplorer v4.52 contains a post-authentication authorization bypass in systemRole/get that allows a low-privilege user to modify global group permission templates. By abusing the group_role parameter, an attacker can overwrite the built-in read-only template and add write permissions such as write:add. Once the template is changed, ordinary users assigned to public groups with read-only membership are immediately granted write access and can create files in shared locations. This results in a real privilege escalation and global ACL corruption rather than a simple interface flaw.
|
|---|
| La source | ⚠️ https://vulnplus-note.wetolink.com/share/atu3UbqnfAgs |
|---|
| Utilisateur | vulnplusbot (UID 96250) |
|---|
| Soumission | 26/03/2026 11:15 (il y a 29 jours) |
|---|
| Modérer | 18/04/2026 21:07 (23 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 358205 [kodcloud KodExplorer jusqu’à 4.52 systemRole.class.php roleGroupAction group_role élévation de privilèges] |
|---|
| Points | 20 |
|---|