CVE-2024-23831

Source
https://cve.org/CVERecord?id=CVE-2024-23831
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-23831.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-23831
Aliases
  • GHSA-98ff-f638-qxjm
Downstream
Published
2024-02-02T15:34:12.121Z
Modified
2026-04-27T04:07:55.514519Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Privilege escalation through CSRF attack on 'setup.pl'
Details

LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admin's consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.

Database specific
{
    "cwe_ids": [
        "CWE-352"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/23xxx/CVE-2024-23831.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/ledgersmb/ledgersmb

Affected ranges

Type
GIT
Repo
https://github.com/ledgersmb/ledgersmb
Events

Affected versions

1.*
1.11.0
1.11.1
1.11.2
1.11.3
1.11.4
1.11.5
1.11.6
1.11.7
1.11.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-23831.json"