CVE-2020-10793

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-10793
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10793.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-10793
Aliases
Published
2020-03-23T15:15:14Z
Modified
2024-10-12T05:32:02.915015Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

CodeIgniter through 4.0.0 allows remote attackers to gain privileges via a modified Email ID to the "Select Role of the User" page. NOTE: A contributor to the CodeIgniter framework argues that the issue should not be attributed to CodeIgniter. Furthermore, the blog post reference shows an unknown website built with the CodeIgniter framework but that CodeIgniter is not responsible for introducing this issue because the framework has never provided a login screen, nor any kind of login or user management facilities beyond a Session library. Also, another reporter indicates the issue is with a custom module/plugin to CodeIgniter, not CodeIgniter itself.

References

Affected packages

Git / github.com/codeigniter4/codeigniter4

Affected ranges

Type
GIT
Repo
https://github.com/codeigniter4/codeigniter4
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

4.*

4.0.0

v4.*

v4.0.0-alpha.1
v4.0.0-alpha.2
v4.0.0-alpha.3
v4.0.0-alpha.4
v4.0.0-alpha.5
v4.0.0-beta.1
v4.0.0-beta.3
v4.0.0-beta.4
v4.0.0-rc.1
v4.0.0-rc.2
v4.0.0-rc.2.1
v4.0.0-rc.2b
v4.0.0-rc.3
v4.0.0-rc.4
v4.0.0.0-alpha.5