Vulnerabilities (CVE)

Filtered by CWE-639
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-27247 1 Cdsoft 1 Winhotel.mx 2022-05-24 5.0 MEDIUM 5.3 MEDIUM
onlinetolls in cdSoft Onlinetools-Smart Winhotel.MX 2021 allows an attacker to download sensitive information about any customer (e.g., data of birth, full address, mail information, and phone number) via GastKont Insecure Direct Object Reference.
CVE-2022-1425 1 2code 1 Wpqa Builder 2022-05-24 4.0 MEDIUM 4.3 MEDIUM
The WPQA Builder Plugin WordPress plugin before 5.2, used as a companion plugin for the Discy and Himer , does not validate that the message_id of the wpqa_message_view ajax action belongs to the requesting user, leading to any user being able to read messages for any other users via a Insecure Direct Object Reference (IDOR) vulnerability.
CVE-2022-1352 1 Gitlab 1 Gitlab 2022-05-19 5.0 MEDIUM 5.3 MEDIUM
Due to an insecure direct object reference vulnerability in Gitlab EE/CE affecting all versions from 11.0 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1, an endpoint may reveal the issue title to a user who crafted an API call with the ID of the issue from a public project that restricts access to issue only to project members.
CVE-2022-23061 1 Shopizer 1 Shopizer 2022-05-09 5.5 MEDIUM 6.5 MEDIUM
In Shopizer versions 2.0 to 2.17.0 a regular admin can permanently delete a superadmin (although this cannot happen according to the documentation) via Insecure Direct Object Reference (IDOR) vulnerability.
CVE-2021-24800 1 Designwall 1 Dw Question \& Answer 2022-05-05 4.0 MEDIUM 4.3 MEDIUM
The DW Question & Answer Pro WordPress plugin through 1.3.4 does not check that the comment to edit belongs to the user making the request, allowing any user to edit other comments.
CVE-2022-1461 1 Open-emr 1 Openemr 2022-05-04 4.0 MEDIUM 6.5 MEDIUM
Non Privilege User can Enable or Disable Registered in GitHub repository openemr/openemr prior to 6.1.0.1.
CVE-2021-29773 2 Ibm, Linux 2 Security Guardium, Linux Kernel 2022-05-03 5.5 MEDIUM 5.4 MEDIUM
IBM Security Guardium 10.6 and 11.3 could allow a remote authenticated attacker to obtain sensitive information or modify user details caused by an insecure direct object vulnerability (IDOR). IBM X-Force ID: 202865.
CVE-2021-35337 1 Phone Shop Sales Management System Project 1 Phone Shop Sales Management System 2022-05-03 4.0 MEDIUM 4.3 MEDIUM
Sourcecodester Phone Shop Sales Managements System 1.0 is vulnerable to Insecure Direct Object Reference (IDOR). Any attacker will be able to see the invoices of different users by changing the id parameter.
CVE-2021-33981 1 Myfwc 1 Fish \| Hunt Fl 2022-05-03 4.0 MEDIUM 4.3 MEDIUM
An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses.
CVE-2020-6641 1 Fortinet 1 Fortipresence 2022-05-03 4.0 MEDIUM 4.3 MEDIUM
Two authorization bypass through user-controlled key vulnerabilities in the Fortinet FortiPresence 2.1.0 administration interface may allow an attacker to gain access to some user data via portal manager or portal users parameters.
CVE-2021-31927 1 Annexcloud 1 Loyalty Experience Platform 2022-05-03 4.0 MEDIUM 4.3 MEDIUM
An Insecure Direct Object Reference (IDOR) vulnerability in Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify any existing user, including users assigned to different environments and clients. It was fixed in v2021.1.0.2.
CVE-2021-3380 1 Height8tech 1 H8 Ssrms 2022-05-03 4.0 MEDIUM 6.5 MEDIUM
Insecure direct object reference (IDOR) vulnerability in ICREM H8 SSRMS allows attackers to disclose sensitive information via the Print Invoice Functionality.
CVE-2021-40352 1 Open-emr 1 Openemr 2022-05-03 4.0 MEDIUM 6.5 MEDIUM
OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.
CVE-2021-39889 1 Gitlab 1 Gitlab 2022-05-03 4.0 MEDIUM 4.3 MEDIUM
In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.
CVE-2021-37212 1 Larvata 1 Flygo 2022-04-25 5.5 MEDIUM 5.4 MEDIUM
The bulletin function of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the bulletin ID in specific Url parameters and access and modify bulletin particular content.
CVE-2021-37215 1 Larvata 1 Flygo 2022-04-25 4.0 MEDIUM 4.3 MEDIUM
The employee management page of Flygo contains an Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attacker can manipulate the user data and then over-write another employee’s user data by specifying that employee’s ID in the API parameter.
CVE-2021-37213 1 Larvata 1 Flygo 2022-04-25 4.0 MEDIUM 4.3 MEDIUM
The check-in record page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID and date in specific parameters to access particular employee’s check-in record.
CVE-2021-37709 1 Shopware 1 Shopware 2022-04-25 4.0 MEDIUM 6.5 MEDIUM
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability involving an insecure direct object reference of log files of the Import/Export feature. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
CVE-2022-29287 1 Kentico 1 Kentico 2022-04-25 4.0 MEDIUM 4.9 MEDIUM
Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).
CVE-2022-0613 1 Uri.js Project 1 Uri.js 2022-02-25 6.4 MEDIUM 6.5 MEDIUM
Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8.
CVE-2022-0639 1 Url-parse Project 1 Url-parse 2022-02-25 5.0 MEDIUM 5.3 MEDIUM
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.
CVE-2022-0512 1 Url-parse Project 1 Url-parse 2022-02-23 5.0 MEDIUM 5.3 MEDIUM
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
CVE-2021-25096 1 Ip2location 1 Country Blocker 2022-02-10 6.4 MEDIUM 6.5 MEDIUM
The IP2Location Country Blocker WordPress plugin before 2.26.5 bans can be bypassed by using a specific parameter in the URL
CVE-2022-0266 1 Livehelperchat 1 Live Helper Chat 2022-01-25 6.0 MEDIUM 6.6 MEDIUM
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
CVE-2021-40579 1 Online Enrollment Management System Project 1 Online Enrollment Management System 2022-01-07 4.0 MEDIUM 6.5 MEDIUM
https://www.sourcecodester.com/ Online Enrollment Management System in PHP and PayPal Free Source Code 1.0 is affected by: Incorrect Access Control. The impact is: gain privileges (remote).
CVE-2021-43820 1 Seafile 1 Seafile Server 2021-12-21 4.3 MEDIUM 5.9 MEDIUM
Seafile is an open source cloud storage system. A sync token is used in Seafile file syncing protocol to authorize access to library data. To improve performance, the token is cached in memory in seaf-server. Upon receiving a token from sync client or SeaDrive client, the server checks whether the token exist in the cache. However, if the token exists in cache, the server doesn't check whether it's associated with the specific library in the URL. This vulnerability makes it possible to use any valid sync token to access data from any **known** library. Note that the attacker has to first find out the ID of a library which it has no access to. The library ID is a random UUID, which is not possible to be guessed. There are no workarounds for this issue.
CVE-2021-3964 1 Elgg 1 Elgg 2021-12-02 4.3 MEDIUM 5.9 MEDIUM
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
CVE-2021-36329 1 Dell 1 Emc Streaming Data Platform 2021-12-02 4.0 MEDIUM 6.5 MEDIUM
Dell EMC Streaming Data Platform versions before 1.3 contain an Indirect Object Reference Vulnerability. A remote malicious user may potentially exploit this vulnerability to gain sensitive information.
CVE-2021-24840 1 Codesupply 1 Squaretype 2021-11-13 5.0 MEDIUM 5.3 MEDIUM
The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation. As a result, private and scheduled posts could be retrieved via a crafted request.
CVE-2019-15582 1 Gitlab 1 Gitlab 2021-11-02 5.0 MEDIUM 5.3 MEDIUM
An IDOR was discovered in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) that allowed a maintainer to add any private group to a protected environment.
CVE-2021-24473 1 Cozmoslabs 1 User Profile Picture 2021-09-20 5.5 MEDIUM 5.4 MEDIUM
The User Profile Picture WordPress plugin before 2.6.0 was affected by an IDOR issue, allowing users with the upload_image capability (by default author and above) to change and delete the profile pictures of other users (including those with higher roles).
CVE-2021-37631 1 Nextcloud 1 Deck 2021-09-14 4.0 MEDIUM 6.5 MEDIUM
Deck is an open source kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. In affected versions the Deck application didn't properly check membership of users in a Circle. This allowed other users in the instance to gain access to boards that have been shared with a Circle, even if the user was not a member of the circle. It is recommended that Nextcloud Deck is upgraded to 1.5.1, 1.4.4 or 1.2.9. If you are unable to update it is advised to disable the Deck plugin.
CVE-2021-37630 1 Nextcloud 1 Circles 2021-09-14 4.0 MEDIUM 6.5 MEDIUM
Nextcloud Circles is an open source social network built for the nextcloud ecosystem. In affected versions the Nextcloud Circles application allowed any user to join any "Secret Circle" without approval by the Circle owner leaking private information. It is recommended that Nextcloud Circles is upgraded to 0.19.15, 0.20.11 or 0.21.4. There are no workarounds for this issue.
CVE-2020-11009 1 Pagerduty 1 Rundeck 2021-09-14 4.0 MEDIUM 6.5 MEDIUM
In Rundeck before version 3.2.6, authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. This vulnerability is patched in version 3.2.6
CVE-2021-21324 1 Glpi-project 1 Glpi 2021-03-17 4.0 MEDIUM 6.5 MEDIUM
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.4 there is an Insecure Direct Object Reference (IDOR) on "Solutions". This vulnerability gives an unauthorized user the ability to enumerate GLPI items names (including users logins) using the knowbase search form (requires authentication). To Reproduce: Perform a valid authentication at your GLPI instance, Browse the ticket list and select any open ticket, click on Solution form, then Search a solution form that will redirect you to the endpoint /"glpi/front/knowbaseitem.php?item_itemtype=Ticket&item_items_id=18&forcetab=Knowbase$1", and the item_itemtype=Ticket parameter present in the previous URL will point to the PHP alias of glpi_tickets table, so just replace it with "Users" to point to glpi_users table instead; in the same way, item_items_id=18 will point to the related column id, so changing it too you should be able to enumerate all the content which has an alias. Since such id(s) are obviously incremental, a malicious party could exploit the vulnerability simply by guessing-based attempts.
CVE-2020-8297 1 Nextcloud 1 Deck 2021-03-02 4.0 MEDIUM 4.3 MEDIUM
Nextcloud Deck before 1.0.2 suffers from an insecure direct object reference (IDOR) vulnerability that permits users with a duplicate user identifier to access deck data of a previous deleted user.
CVE-2020-26178 1 Tangro 1 Business Workflow 2020-12-21 5.0 MEDIUM 5.3 MEDIUM
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
CVE-2020-13357 1 Gitlab 1 Gitlab 2020-12-14 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.
CVE-2020-26068 1 Cisco 2 Roomos, Telepresence Collaboration Endpoint 2020-11-25 5.5 MEDIUM 6.5 MEDIUM
A vulnerability in the xAPI service of Cisco Telepresence CE Software and Cisco RoomOS Software could allow an authenticated, remote attacker to generate an access token for an affected device. The vulnerability is due to insufficient access authorization. An attacker could exploit this vulnerability by using the xAPI service to generate a specific token. A successful exploit could allow the attacker to use the generated token to enable experimental features on the device that should not be available to users.
CVE-2020-27742 1 Citadel 1 Webcit 2020-11-04 4.0 MEDIUM 6.5 MEDIUM
An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else's emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread.
CVE-2019-5466 1 Gitlab 1 Gitlab 2020-10-20 4.0 MEDIUM 4.3 MEDIUM
An IDOR was discovered in GitLab CE/EE 11.5 and later that allowed new merge requests endpoint to disclose label names.
CVE-2020-8235 1 Nextcloud 1 Deck 2020-10-13 4.0 MEDIUM 4.3 MEDIUM
Missing access control in Nextcloud Deck 1.0.4 caused an insecure direct object reference allowing an attacker to view all attachments.
CVE-2020-16240 1 Ge 1 Asset Performance Management Classic 2020-10-05 5.0 MEDIUM 5.3 MEDIUM
GE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerability allows user account data to be downloaded in JavaScript object notation (JSON) format by users who should not have access to such functionality. An attacker can download sensitive data related to user accounts without having the proper privileges.
CVE-2018-16971 1 Wisetail 1 Learning Management System 2020-08-24 4.0 MEDIUM 4.3 MEDIUM
Wisetail Learning Ecosystem (LE) through v4.11.6 allows insecure direct object reference (IDOR) attacks to access non-purchased course contents (quiz / test) via a modified id parameter.
CVE-2019-9921 1 Harmistechnology 1 Je Messenger 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in the Harmis JE Messenger component 1.2.2 for Joomla!. It is possible to read information that should only be accessible by a different user.
CVE-2019-9170 1 Gitlab 1 Gitlab 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control.
CVE-2019-8235 1 Magento 1 Magento 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An insecure direct object reference (IDOR) vulnerability exists in Magento 2.3 prior to 2.3.1, 2.2 prior to 2.2.8, and 2.1 prior to 2.1.17 versions. An authenticated user may be able to view personally identifiable shipping details of another user due to insufficient validation of user controlled input.
CVE-2019-7925 1 Magento 1 Magento 2020-08-24 5.5 MEDIUM 4.9 MEDIUM
An insecure direct object reference (IDOR) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an administrator with limited privileges to delete the downloadable products folder.
CVE-2019-7872 1 Magento 1 Magento 2020-08-24 5.5 MEDIUM 6.5 MEDIUM
An insecure direct object reference (IDOR) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 due to insufficient authorizations checks. This can be abused by a user with admin privileges to add users to company accounts or modify existing user details.
CVE-2019-7864 1 Magento 1 Magento 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
An insecure direct object reference (IDOR) vulnerability exists in the RSS feeds of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can lead to unauthorized access to order details.