Skip to content

Bypass of protected attribute update

Moderate
labo-flg published GHSA-8262-pw2q-5qc3 Apr 30, 2025

Package

OpenCTI

Affected versions

6.4.8

Patched versions

6.4.10

Description

Summary

In the own user profile, there are deny and allow list for which attributes a user is allowed to update.
These allow/deny lists can be bypassed, allowing a user to change attributes that are intended to be unmodifiable by the user.

Impact

We have not identified any privilege escalation issues with this, mainly due to schema validation check are in place in the latest version, which hinders a user to for example update its own id to the same value of an existing administrator.

It is however possible to toggle the external flag on/off and change the own token value for a user.
It is also possible to edit attributes that are not in the allow list, such as otp_qr and otp_activated.

If external users exist in the OpenCTI setup and the information about these users identities is sensitive, the above vulnerabilities can be used to enumerate existing user accounts as a standard low privileged user.

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVE ID

CVE-2025-24887

Credits