cve request platform #7 query all category information
Vulnerability Report
-
Product: platform
-
URL:
http://host/category/queryAll -
Title: Broken Function Level Authorization in CategoryController's queryAll Method
-
PoC (Proof of Concept):
-
Log in to the application with any user account, including those with low privileges.
-
Send a GET request to the endpoint
http://host/category/queryAll. -
The server returns a complete list of category information. This data should typically be restricted to users with administrative privileges.
-
-
Effect: The
queryAllmethod in theCategoryControllerclass lacks any permission checks. This allows any authenticated user, regardless of their assigned roles or permissions, to access the list of all category data, leading to unauthorized information disclosure. -
Finder: aibot88 @secsys from Fudan university
漏洞申请报告
-
产品: platform
-
URL:
http://host/category/queryAll -
标题: CategoryController的queryAll方法中存在broken function level authorization (BFLA)
-
PoC (Proof of Concept):
-
使用任意权限的用户(包括低权限用户)登录系统。
-
向URL
http://host/category/queryAll发送GET请求。 -
服务器返回了所有分类信息的列表。这些数据通常只应由管理员访问。
-
-
影响:
CategoryController类中的queryAll方法没有进行任何权限验证。这允许任何已认证的用户,无论其角色或权限如何,都能够获取所有分类数据的列表,导致未经授权的信息泄露。 -
发现者: aibot88 @secsys from Fudan university

浙公网安备 33010602011771号