growi is vulnerable to Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://huntr.dev/bounties/d44def81-2834-4031-9037-e923975c3852 | third party advisory exploit |
https://github.com/weseek/growi/commit/863bfd7f622f413bd159b9446166fb1ce78ec863 | third party advisory patch |