提出 #644133: Portabilis i-educar 2.10 Broken Access Control情報

タイトルPortabilis i-educar 2.10 Broken Access Control
説明# Broken Access Control in `/enturmacao-em-lote/[ID]` Endpoint --- ## Summary A **Broken Access Control** vulnerability was identified in the `/enturmacao-em-lote/[ID]` endpoint of the _i-educar_ application. This vulnerability allows users without proper permissions to access restricted functionality, bypassing authorization checks. --- ## Details **Vulnerable Endpoint:** `GET /enturmacao-em-lote/[ID]` **Authentication:** Required The application fails to properly validate user permissions before granting access to this endpoint. As a result, even low-privileged users can successfully access the functionality intended only for . --- ## PoC 1. Authenticate as a non-privileged user. ![[Pasted image 20250821190942.png]] ![[Pasted image 20250821191019.png]] 2. Send the following request:: ``` GET /enturmacao-em-lote/15 HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br, zstd Connection: keep-alive Cookie: i_educar_session=ikrAPvWjSx0V5drm82zlgu1kBByJdsCx1gJkiwsu Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: none Sec-Fetch-User: ?1 Priority: u=0, i ``` 3. We could observe that we have access to the page and to the function to batch assign students to classes. And, this user, should not do that. ![[Pasted image 20250821194402.png]] --- ## Impact Broken Access Control vulnerabilities can have severe consequences, including: - Unauthorized access to restricted functionality - Escalation of privileges for low-level users - Exposure of sensitive data and potential system compromise - Loss of confidentiality and integrity of educational records - Reputational damage to the organization
ソース⚠️ https://github.com/marcelomulder/CVE/blob/main/i-educar/Broken%20Access%20Control%20Vulnerability%20%20in%20%60.enturmacao-em-lote.(ID)%60%20Endpoint.md
ユーザー
 marceloQz (UID 87549)
送信2025年08月29日 16:21 (8 月 ago)
モデレーション2025年09月07日 13:45 (9 days later)
ステータス承諾済み
VulDBエントリ323018 [Portabilis i-Educar 迄 2.10 /enturmacao-em-lote/ 特権昇格]
ポイント20

Do you know our Splunk app?

Download it now for free!