CVE-2024-25632
Unauthorised granting of administrator privileges over arbitrary teams under certain circumstances
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
eLabFTW is an open source electronic lab notebook for research labs. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A user may be an administrator in one team and a regular user in another. The vulnerability allows a regular user to become administrator of a team where they are a member, under a reasonable configuration. Additionally, in eLabFTW versions subsequent to v5.0.0, the vulnerability may allow an initially unauthenticated user to gain administrative privileges over an arbitrary team. The vulnerability does not affect system administrator status. Users should upgrade to version 5.1.0. System administrators are advised to turn off local user registration, saml_team_create and not allow administrators to import users into teams, unless strictly required.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-02-08 CVE Reserved
- 2024-10-01 CVE Published
- 2024-10-01 CVE Updated
- 2024-10-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-266: Incorrect Privilege Assignment
- CWE-842: Placement of User into Incorrect Group
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://github.com/elabftw/elabftw/security/advisories/GHSA-6m7p-gh9f-5mgg | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Elabftw Search vendor "Elabftw" | Elabftw Search vendor "Elabftw" for product "Elabftw" | >= 4.6.0 < 5.1.0 Search vendor "Elabftw" for product "Elabftw" and version " >= 4.6.0 < 5.1.0" | en |
Affected
|