Permissions, Privileges, and Access Controls in Avatar - CVE-2019-10377
Published: October 4, 2019
Avatar
Detailed vulnerability description
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to the affected software does not implement a permission check for the HTTP URL used to replace user avatars. A remote authenticated attacker with Overall/Read permission can change any other user’s avatar, in addition to their own.