漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
APTRS: Privilege Escalation via Mass Assignment of is_superuser in User Edit Endpoint
Vulnerability Description
APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. Prior to version 2.0.1, the edit_user endpoint (POST /api/auth/edituser/<pk>) allows Any user who can reach that endpoint and submit crafted permission to escalate their own account (or any other account) to superuser by including "is_superuser": true in the request body. The root cause is that CustomUserSerializer explicitly includes is_superuser in its fields list but omits it from read_only_fields, making it a writable field. The edit_user view performs no additional validation to prevent non-superusers from modifying this field. Once is_superuser is set to true, gaining unrestricted access to all application functionality without requiring re-authentication. This issue has been patched in version 2.0.1.
CVSS Information
N/A
Vulnerability Type
CWE-915
Vulnerability Title
APTRS 安全漏洞
Vulnerability Description
APTRS(Automated Penetration Testing Reporting System)是APTRS开源的一款基于 Python 和 Django 的自动报告工具。专为渗透测试人员和安全组织而设计。 APTRS 2.0.1之前版本存在安全漏洞,该漏洞源于edit_user端点允许用户通过请求体修改is_superuser字段,可能导致权限提升。
CVSS Information
N/A
Vulnerability Type
N/A