In LuxSoft LuxCal Web Calendar before 5.2.0, an unauthenticated attacker can manipulate a POST request. This allows the attacker's session to be authenticated as any registered LuxCal user, including the site administrator.
References
Link | Resource |
---|---|
https://github.com/h1pmnh | Not Applicable |
https://h1pmnh.github.io/post/cve-luxcal-2021/ | Third Party Advisory |
https://twitter.com/h1pmnh | Third Party Advisory |
https://www.luxsoft.eu/index.php?pge=dload | Product Release Notes Vendor Advisory |
https://github.com/h1pmnh | Not Applicable |
https://h1pmnh.github.io/post/cve-luxcal-2021/ | Third Party Advisory |
https://twitter.com/h1pmnh | Third Party Advisory |
https://www.luxsoft.eu/index.php?pge=dload | Product Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/h1pmnh - Not Applicable | |
References | () https://h1pmnh.github.io/post/cve-luxcal-2021/ - Third Party Advisory | |
References | () https://twitter.com/h1pmnh - Third Party Advisory | |
References | () https://www.luxsoft.eu/index.php?pge=dload - Product, Release Notes, Vendor Advisory |
Information
Published : 2022-05-24 15:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45914
Mitre link : CVE-2021-45914
CVE.ORG link : CVE-2021-45914
JSON object : View
Products Affected
luxsoft
- luxcal
CWE