제출 #625984: Open-Source LitmusChaos 3.19.0 Broken Access Control via Login Response Manipulation정보

제목Open-Source LitmusChaos 3.19.0 Broken Access Control via Login Response Manipulation
설명A broken access control vulnerability was identified in the LitmusChaos platform, where a user can gain unauthorized access to another user's project by manipulating the projectID returned in the response of the /auth/login endpoint. This flaw results from excessive trust in client-side data and a lack of server-side validation after authentication. Details Upon successful authentication, the /auth/login response includes a list of accessible project IDs and the user's role for each. This information is stored on the client side and is used by the frontend to determine access and visibility to projects. However, by intercepting and modifying this response, specifically the projectID value, a malicious user can inject unauthorized project references. The backend fails to verify whether the user truly has access to the referenced project, thus allowing privilege escalation and access to resources beyond their scope. This weakness violates the principle of secure-by-default access control and exposes internal project data across user boundaries.
원천⚠️ https://github.com/MaiqueSilva/VulnDB/blob/main/readme05.md
사용자
 maique (UID 88562)
제출2025. 07. 31. AM 04:19 (9 개월 ago)
모더레이션2025. 08. 09. AM 07:34 (9 days later)
상태수락
VulDB 항목319323 [LitmusChaos Litmus 까지 3.19.0 /auth/login projectID 권한 상승]
포인트들20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!