LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admins consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ledgersmb | Ledgersmb | 1.3.0 (including) | 1.10.30 (excluding) |
Ledgersmb | Ledgersmb | 1.11.0 (including) | 1.11.9 (excluding) |
Ledgersmb | Ubuntu | bionic | * |
Ledgersmb | Ubuntu | devel | * |
Ledgersmb | Ubuntu | esm-apps/focal | * |
Ledgersmb | Ubuntu | esm-apps/jammy | * |
Ledgersmb | Ubuntu | esm-apps/noble | * |
Ledgersmb | Ubuntu | focal | * |
Ledgersmb | Ubuntu | jammy | * |
Ledgersmb | Ubuntu | mantic | * |
Ledgersmb | Ubuntu | noble | * |
Ledgersmb | Ubuntu | oracular | * |
Ledgersmb | Ubuntu | plucky | * |
Ledgersmb | Ubuntu | trusty | * |
Ledgersmb | Ubuntu | upstream | * |
Ledgersmb | Ubuntu | xenial | * |