#VU63648 Improper access control in Rescue Dispatch Management System


Published: 2022-05-25

Vulnerability identifier: #VU63648

Vulnerability risk: Medium

CVSSv3.1: 8.1 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2022-30016

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Rescue Dispatch Management System
Web applications / Modules and components for CMS

Vendor: sourcecodester

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Rescue Dispatch Management System: 1.0


External links
http://www.sourcecodester.com/php/15296/rescue-dispatch-management-system-phpoop-free-source-code.html
http://github.com/offsecin/bugsdisclose/blob/main/access-control


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability