An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.tangro.de/ | product |
https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ | third party advisory exploit |