Tangro

Business Workflow

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.16%
  • Veröffentlicht 18.12.2020 10:15:13
  • Zuletzt bearbeitet 21.11.2024 05:19:27

In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 18.12.2020 10:15:13
  • Zuletzt bearbeitet 21.11.2024 05:19:27

An issue was discovered in tangro Business Workflow before 1.18.1. No (or broken) access control checks exist on the /api/document/<DocumentID>/attachments API endpoint. Knowing a document ID, an attacker can list all the attachments of a workitem, i...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 18.12.2020 10:15:13
  • Zuletzt bearbeitet 21.11.2024 05:19:27

In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out val...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 18.12.2020 10:15:13
  • Zuletzt bearbeitet 21.11.2024 05:19:27

In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 18.12.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:26

In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.

Exploit
  • EPSS 0.2%
  • Veröffentlicht 18.12.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:26

Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 18.12.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:26

An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 18.12.2020 10:15:12
  • Zuletzt bearbeitet 21.11.2024 05:19:26

tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. Thi...