| タイトル | z-9527 admin ≤ commit 72aaf2d Dynamically-Determined Object Attributes |
|---|
| 説明 | A mass assignment vulnerability exists in Z-9527 Admin ≤ commit 72aaf2d at the /user/update endpoint, where user-supplied parameters are directly iterated and incorporated into SQL UPDATE statements without field whitelisting. As a result, authenticated attackers can modify arbitrary database columns, including privilege-escalation fields such as isAdmin. Mitigations include implementing a strict whitelist of updatable fields, using an ORM with explicit field mapping, validating all input parameters against allowed attributes, separating privileged fields into admin-only update routes, and applying role-based access control before processing any update operations. |
|---|
| ソース | ⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/z9527-admin/vulnerability-11 |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2026年03月16日 04:37 (22 日 ago) |
|---|
| モデレーション | 2026年03月31日 18:11 (16 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 354441 [z-9527 admin 1.0/2.0 User Update Endpoint /server/routes/user.js isAdmin 特権昇格] |
|---|
| ポイント | 20 |
|---|