漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data
Vulnerability Description
wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling `self.get_object()`. In versions up to and including 2.4, ache keys are scoped only by `pk` — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
通过用户控制密钥绕过授权机制
Vulnerability Title
wger 安全漏洞
Vulnerability Description
wger是wger Project开源的使用 Django 编写的自托管 FLOSS 健身/锻炼、营养和体重追踪器。 wger 2.4及之前版本存在安全漏洞,该漏洞源于缓存键范围不当,可能导致未经授权的数据访问。
CVSS Information
N/A
Vulnerability Type
N/A