Access Restriction Bypass Affecting elgg/elgg package, versions >=4.0.0-beta.1, <4.0.4<3.3.22


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.09% (41st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-ELGGELGG-1933462
  • published1 Dec 2021
  • disclosed1 Dec 2021
  • creditBreno Vitório

Introduced: 1 Dec 2021

CVE-2021-3964  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade elgg/elgg to version 4.0.4, 3.3.22 or higher.

Overview

elgg/elgg is a development framework used for creating socially aware web applications.

Affected versions of this package are vulnerable to Access Restriction Bypass due to missing validation of parameter called user_guid. It is possible for any user to intercept the HTTP request and change the user_guid parameter to any other user ID.

CVSS Scores

version 3.1