CVE-2021-31590
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
PwnDoc all versions until 0.4.0 (2021-08-23) has incorrect JSON Webtoken handling, leading to incorrect access control. With a valid JSON Webtoken that is used for authentication and authorization, a user can keep his admin privileges even if he is downgraded to the "user" privilege. Even after a user's account is deleted, the user can still access the administration panel (and add or delete users) and has complete access to the system.
PwnDoc todas las versiones hasta la 0.4.0 (2021-08-23) tiene un manejo incorrecto de JSON Webtoken, lo que lleva a un control de acceso incorrecto. Con un Webtoken JSON válido que se utiliza para la autenticación y la autorización, un usuario puede mantener sus privilegios de administrador incluso si es degradado al privilegio de "usuario". Incluso después de que se elimine la cuenta de un usuario, éste puede seguir accediendo al panel de administración (y añadir o eliminar usuarios) y tiene acceso completo al sistema
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-04-22 CVE Reserved
- 2021-07-19 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://github.com/pwndoc/pwndoc/security/advisories | Broken Link |
URL | Date | SRC |
---|---|---|
https://www.dgc.org/responsible_disclosure_pwndoc_jwt | 2024-08-03 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pwndoc Project Search vendor "Pwndoc Project" | Pwndoc Search vendor "Pwndoc Project" for product "Pwndoc" | < 0.4.0 Search vendor "Pwndoc Project" for product "Pwndoc" and version " < 0.4.0" | - |
Affected
|