GHSA-9mmc-27gw-w6mq

Suggest an improvement
Source
https://github.com/advisories/GHSA-9mmc-27gw-w6mq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-9mmc-27gw-w6mq/GHSA-9mmc-27gw-w6mq.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9mmc-27gw-w6mq
Aliases
Published
2022-09-29T00:00:27Z
Modified
2025-05-21T16:43:52Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Bytebase allows low-privilege users to view admin projects
Details

Overview

The "Bytebase" application does not restrict low privilege user from accessing admin projects

Details

The "Bytebase" application does not restrict low privilege user from accessing admin projects for which an unauthorized user can view the "projects" created by "Admin". The affected endpoint is /api/project?user=${userId}.

PoC

  1. Log in to the application as both "Admin" (admin@example.com:admin) and Developer "User" (user@admin.com:user) and then click on "Projects".
  2. Now open "Burp suite" and turn "Intercept on" and from "admin" dashboard click on "projects" and see the "user id" of "admin" in the capture request.
  3. Note the "user id" and "Forward" the request and again capture the request of "projects" from the "user" dashboard and change "user id" to "admin user id" and "Forward" the request.
  4. Now "user" can see the "projects" created by "admin".
Database specific
{
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-285"
    ],
    "nvd_published_at": "2022-09-28T10:15:00Z",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-24T20:10:21Z"
}
References

Affected packages

Go / github.com/bytebase/bytebase

Package

Name
github.com/bytebase/bytebase
View open source insights on deps.dev
Purl
pkg:golang/github.com/bytebase/bytebase

Affected ranges

Type
SEMVER
Events
Introduced
0.1.0
Last affected
1.0.4