Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2020-26175
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.
0
Attacker Value
Unknown
CVE-2020-26173
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.
0
Attacker Value
Unknown
CVE-2020-26171
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.
0
Attacker Value
Unknown
CVE-2020-26177
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side.
0
Attacker Value
Unknown
CVE-2020-26178
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
0
Attacker Value
Unknown
CVE-2020-26176
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
An issue was discovered in tangro Business Workflow before 1.18.1. No (or broken) access control checks exist on the /api/document/<DocumentID>/attachments API endpoint. Knowing a document ID, an attacker can list all the attachments of a workitem, including their respective IDs. This allows the attacker to gather valid attachment IDs for workitems that do not belong to them.
0
Attacker Value
Unknown
CVE-2020-26172
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.
0
Attacker Value
Unknown
CVE-2020-26174
Disclosure Date: December 18, 2020 (last updated February 22, 2025)
tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. This allows an attacker to upload any file as an attachment to a workitem.
0