Access Restriction Bypass Affecting roundup package, versions <1.4.4-4+lenny1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.23% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-ROUNDUP-301801
  • published11 Aug 2009
  • disclosed11 Aug 2009

Introduced: 11 Aug 2009

CVE-2009-2737  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade Debian:8 roundup to version 1.4.4-4+lenny1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream roundup package and not the roundup package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

The EditCSVAction function in cgi/actions.py in Roundup 1.2 before 1.2.1, 1.4 through 1.4.6, and possibly other versions does not properly check permissions, which allows remote authenticated users with edit or create privileges for a class to modify arbitrary items within that class, as demonstrated by editing all queries, modifying settings, and adding roles to users.

CVSS Scores

version 3.1