Recently, our team found an arbitrary user info update vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
|
func (u *User) UpdateUser(ctx context.Context, req *vuser.UpdateUserReq) (res *vuser.UpdateUserRes, err error) { |
The operation is not protected by permission checks, which means an attacker can arbitrary user info update.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.
Recently, our team found an arbitrary user info update vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
goframe-admin/internal/controller/user/user.go
Line 21 in 93a98d6
The operation is not protected by permission checks, which means an attacker can arbitrary user info update.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.