Recently, our team found an arbitrary user delete vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
|
func (u *User) DeleteUser(ctx context.Context, req *vuser.DeleteUserReq) (res *vuser.DeleteUserRes, err error) { |
The operation is not protected by permission checks, which means an attacker can arbitrary user delete.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.
Recently, our team found an arbitrary user delete vulnerability in the latest version of the project.
The vulnerability logic is present in the file:
goframe-admin/internal/controller/user/user.go
Line 17 in 93a98d6
The operation is not protected by permission checks, which means an attacker can arbitrary user delete.
To address this vulnerability, we strongly advise that developers implement access control policies that limit API access to admin users or the owner.