Authorization Bypass Through User-Controlled Key Affecting wazuh package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-WAZUH-5952714
  • published10 Oct 2023
  • disclosed9 Oct 2023
  • creditUnknown

Introduced: 9 Oct 2023

CVE-2023-42455  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

wazuh is a Wazuh app

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the Wazuh API administrator key. An attacker can gain unauthorized administrative access by using the browser development tools. This allows a logged user to the dashboard to become administrator of the API, even if their dashboard role is not.

CVSS Scores

version 3.1