IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21682798 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91239 | vdb entry |