The check-in record page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID and date in specific parameters to access particular employee’s check-in record.
Solution:
The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-4990-0c75d-1.html | third party advisory |