Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Very High

Serpico admin user can be accessed without admin creds

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. An admin can change their password without providing the current password, by using interfaces outside the Change Password screen. Thus, requiring the admin to enter an Old Password value on the Change Password screen does not enhance security. This is problematic in conjunction with XSS.
Attacker Value
Unknown

CVE-2019-19858

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. admin/add_user/UID allows stored XSS via the author parameter.
Attacker Value
Unknown

CVE-2019-19854

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. It does not use CSRF Tokens to mitigate against CSRF; it uses the Origin header (which must match the request origin). This is problematic in conjunction with XSS: one can escalate privileges from User level to Administrator.
Attacker Value
Unknown

CVE-2019-19855

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. admin/list_user allows stored XSS via the auth_type parameter.
Attacker Value
Unknown

CVE-2019-19856

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. The User Type on the admin/list_user page allows stored XSS via the type parameter.
Attacker Value
Unknown

CVE-2019-19859

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
An issue was discovered in Serpico (aka SimplE RePort wrIting and CollaboratiOn tool) 1.3.0. The Add Collaborator allows unlimited data via the author parameter, even if the data does not match anything in the database.