Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.
Start learningThere is no fixed version for indico
.
indico is a conference lifecycle management and meeting/lecture scheduling tool.
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the /api/principals
endpoint, which allows users to expose other users' data via POST request containing arbitrary user ID values.