Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1qd3FwLXdoNWctNGdtbc4AAj_g
CodeIgniter Improper Privilege Management
CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page. NOTE: A contributor to the CodeIgniter framework argues that the issue should not be attributed to CodeIgniter. Furthermore, the blog post reference shows an unknown website built with the CodeIgniter framework but that CodeIgniter is not responsible for introducing this issue because the framework has never provided a login screen, nor any kind of login or user management facilities beyond a Session library. Also, another reporter indicates the issue is with a custom module/plugin to CodeIgniter, not CodeIgniter itself.
Permalink: https://github.com/advisories/GHSA-jwqp-wh5g-4gmmJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qd3FwLXdoNWctNGdtbc4AAj_g
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 12 days ago
CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-jwqp-wh5g-4gmm, CVE-2020-10793
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-10793
- https://codeigniter4.github.io/userguide/extending/authentication.html
- https://medium.com/@vbharad/account-takeover-via-modifying-email-id-codeigniter-framework-ca30741ad297
- https://github.com/advisories/GHSA-jwqp-wh5g-4gmm
Affected Packages
packagist:codeigniter4/framework
Dependent packages: 239Dependent repositories: 2,160
Downloads: 1,966,631 total
Affected Version Ranges: <= 4.0.0
No known fixed version
All affected versions: 4.0.0