Vulnerabilities > CVE-2022-29287 - Authorization Bypass Through User-Controlled Key vulnerability in Kentico
Attack vector
NETWORK Attack complexity
LOW Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://devnet.kentico.com/download/hotfixes
- https://devnet.kentico.com/download/hotfixes
- https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/
- https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/