An improper authorization vulnerability exists where an authenticated, low privileged remote attacker could view a list of all the users available in the application.
Solution:
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://www.tenable.com/security/tns-2023-29 | vendor advisory |