{"id":16553,"date":"2021-07-07T12:40:51","date_gmt":"2021-07-07T10:40:51","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2018-0015\/"},"modified":"2021-07-19T14:08:02","modified_gmt":"2021-07-19T12:08:02","slug":"usd-2018-0015","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2018-0015\/","title":{"rendered":"usd-2018-0015"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2018-0015 | Lexware Professional 2017\/17.02<\/span><\/h1>\n<p><span><\/span><\/p>\n<p><span><\/span><strong>Advisory ID<\/strong><span>: usd-2018-0015<\/span><br \/><strong>CVE Number<\/strong><span>: N\/A<\/span><br \/><strong>Affected Product<\/strong><span>: Lexware Professional 2017<\/span><br \/><strong>Affected Version<\/strong><span>: 17.02<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Improper\/Missing Access Control<\/span><br \/><strong>Security Risk<\/strong><span>: Critical<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/shop.lexware.de\/reisekosten-abrechnung\" target=\"_blank\" rel=\"noopener\">https:\/\/shop.lexware.de\/reisekosten-abrechnung<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p><span>The vulnerability considered here, is the lack of access control on individual users access rights within the database. Once the database is made accessible with the user credentials, irrespective of the privilege level of the user, it is possible to alter data, which should have been otherwise forbidden or hindered. The vulnerability, by design, has serious implications since this allows any user with access to database to alter crucial contents, for example, properties of other users such as name and the group id. This has a broad spectrum of potential impacts, ranging from changing a user\u2019s description to changing the group id and properties. This indicates an easily available method to grant higher privileges to self or alternatively to lower the privileges of an admin level user.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3><\/h3>\n<h3>Fix<\/h3>\n<p><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Access_Control_Cheat_Sheet.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Access_Control_Cheat_Sheet.html<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3>Credits<\/h3>\n<p><span>This security vulnerabilities were found by Sebastian Puttkammer of usd AG.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2018-0015 | Lexware Professional 2017\/17.02 Advisory ID: usd-2018-0015CVE Number: N\/AAffected Product: Lexware Professional 2017Affected Version: 17.02Vulnerability Type: Improper\/Missing Access ControlSecurity Risk: CriticalVendor URL: https:\/\/shop.lexware.de\/reisekosten-abrechnungVendor Status: Fixed Description The vulnerability considered here, is the lack of access control on individual users access rights within the database. Once the database is made accessible with the user credentials, [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16553","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16553"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16553\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}