TestLink 1.9.20 is vulnerable to Incorrect Access Control in the TestPlan editing section. When a new TestPlan is created, an ID with an incremental value is automatically generated. Using the edit function you can change the tplan_id parameter to another ID. The application does not carry out a check on the user's permissions maing it possible to recover the IDs of all the TestPlans (even the administrative ones) and modify them even with minimal privileges.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-46097.md | Exploit Third Party Advisory |
Configurations
History
10 Jul 2025, 15:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Alkatraz97/CVEs/blob/main/CVE-2024-46097.md - Exploit, Third Party Advisory | |
First Time |
Testlink
Testlink testlink |
|
CPE | cpe:2.3:a:testlink:testlink:1.9.20:*:*:*:*:*:*:* |
27 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-27 18:15
Updated : 2025-07-10 15:33
NVD link : CVE-2024-46097
Mitre link : CVE-2024-46097
JSON object : View
Products Affected
testlink
- testlink
CWE
No CWE.