A remote attacker could bypass the Sandstorm organization restriction before build 0.203 via a comma in an email-address field.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/sandstorm-io/sandstorm/commit/37bd9a7f4eb776cdc2d3615f0bfea1254b66f59d | third party advisory patch |
https://github.com/sandstorm-io/sandstorm/blob/v0.202/shell/packages/sandstorm-db/db.js#L1112 | third party advisory |
https://sandstorm.io/news/2017-03-02-security-review | vendor advisory |
https://devco.re/blog/2018/01/26/Sandstorm-Security-Review-CVE-2017-6200-en/ | third party advisory exploit |