提出 #780607: z-9527 admin ≤ commit 72aaf2d Dynamically-Determined Object Attributes情報

タイトルz-9527 admin ≤ commit 72aaf2d Dynamically-Determined Object Attributes
説明A mass assignment vulnerability exists in Z-9527 Admin ≤ commit 72aaf2d at the /user/update endpoint, where user-supplied parameters are directly iterated and incorporated into SQL UPDATE statements without field whitelisting. As a result, authenticated attackers can modify arbitrary database columns, including privilege-escalation fields such as isAdmin. Mitigations include implementing a strict whitelist of updatable fields, using an ORM with explicit field mapping, validating all input parameters against allowed attributes, separating privileged fields into admin-only update routes, and applying role-based access control before processing any update operations.
ソース⚠️ https://github.com/CC-T-454455/Vulnerabilities/tree/master/z9527-admin/vulnerability-11
ユーザー
 Anonymous User
送信2026年03月16日 04:37 (22 日 ago)
モデレーション2026年03月31日 18:11 (16 days later)
ステータス承諾済み
VulDBエントリ354441 [z-9527 admin 1.0/2.0 User Update Endpoint /server/routes/user.js isAdmin 特権昇格]
ポイント20

Do you know our Splunk app?

Download it now for free!