Description
LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admin's consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.
Published: 2024-02-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-21274 LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admin's consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.
Ubuntu USN Ubuntu USN USN-7647-1 LedgerSMB vulnerabilities
History

No history.

Subscriptions

Ledgersmb Ledgersmb
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-21T15:39:55.803Z

Reserved: 2024-01-22T22:23:54.339Z

Link: CVE-2024-23831

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:07.975Z

cve-icon NVD

Status : Modified

Published: 2024-02-02T16:15:55.593

Modified: 2024-11-21T08:58:30.993

Link: CVE-2024-23831

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses