First published: Thu Dec 20 2018(Updated: )
An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confirmed_at parameter with their registration request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Coherence | <0.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20301 is classified as a medium severity vulnerability due to its potential impact on user account security.
To fix CVE-2018-20301, upgrade to version 0.5.2 or later of the Coherence software to eliminate the mass assignment vulnerability.
CVE-2018-20301 affects all versions of the Coherence software prior to 0.5.2, allowing unauthorized changes to coherence_fields.
Attackers can exploit CVE-2018-20301 to manipulate or update coherence_fields data, potentially confirming accounts without authorization.
If users are still running versions of Coherence before 0.5.2, they remain at risk for exploitation through CVE-2018-20301.