Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2020-26175

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.
Attacker Value
Unknown

CVE-2020-26173

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.
Attacker Value
Unknown

CVE-2020-26171

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.
Attacker Value
Unknown

CVE-2020-26177

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side.
Attacker Value
Unknown

CVE-2020-26178

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
Attacker Value
Unknown

CVE-2020-26176

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
An issue was discovered in tangro Business Workflow before 1.18.1. No (or broken) access control checks exist on the /api/document/<DocumentID>/attachments API endpoint. Knowing a document ID, an attacker can list all the attachments of a workitem, including their respective IDs. This allows the attacker to gather valid attachment IDs for workitems that do not belong to them.
Attacker Value
Unknown

CVE-2020-26172

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.
Attacker Value
Unknown

CVE-2020-26174

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. This allows an attacker to upload any file as an attachment to a workitem.