Datalust Seq before 4.2.605 is vulnerable to Authentication Bypass (with the attacker obtaining admin access) via '"Name":"isauthenticationenabled","Value":false' in an api/settings/setting-isauthenticationenabled PUT request.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/datalust/seq-tickets/issues/675 | third party advisory patch |
https://medium.com/stolabs/bypass-admin-authentication-on-seq-17f0f9e02732 | third party advisory exploit technical description |
https://www.exploit-db.com/exploits/45136/ | third party advisory vdb entry exploit |