logo

CVE-2024-27292 docassemble-webapp

Package

Manager: pip
Name: docassemble-webapp
Vulnerable Version: =1.4.53 || =1.4.54 || =1.4.55 || =1.4.56 || =1.4.57 || =1.4.58 || =1.4.59 || =1.4.60 || =1.4.61 || =1.4.62 || =1.4.63 || =1.4.64 || =1.4.65 || =1.4.66 || =1.4.67 || =1.4.68 || =1.4.69 || =1.4.70 || =1.4.71 || =1.4.72 || =1.4.73 || =1.4.74 || =1.4.75 || =1.4.76 || =1.4.77 || =1.4.78 || =1.4.79 || =1.4.80 || =1.4.81 || =1.4.82 || =1.4.83 || =1.4.84 || =1.4.85 || =1.4.86 || =1.4.87 || =1.4.88 || =1.4.89 || =1.4.90 || =1.4.91 || =1.4.92 || =1.4.93 || =1.4.94 || =1.4.95 || =1.4.96 || >=1.4.53 <1.4.97

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.93859 pctl0.99861

Details

Docassemble unauthorized access through URL manipulation ### Impact The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. ### Patches The vulnerability has been patched in version 1.4.97 of the master branch. The Docker image on docker.io has been patched. ### Workarounds If upgrading is not possible, manually apply the changes of [97f77dc](https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9) and restart the server. ### Credit The vulnerability was discovered by Riyush Ghimire (@richighimi). ### For more information If you have any questions or comments about this advisory: * Open an issue in [docassemble](https://github.com/jhpyle/docassemble/issues) * Join the [Slack channel](https://join.slack.com/t/docassemble/shared_invite/zt-2cspzjo9j-YyE7SrLmi5muAvnPv~Bz~A) * Email us at jhpyle@gmail.com

Metadata

Created: 2024-02-29T22:14:46Z
Modified: 2024-03-21T18:32:21.675302Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-706"]
Alternative ID: N/A
Finding: F013
Auto approve: 1