
Cloud Vulnerability DB
A community-led vulnerabilities database
Prototype 1.6.0.1 contains an improper access control vulnerability (CVE-2020-7993) that allows remote authenticated users to forge ticket creation on behalf of other user accounts by modifying the email ID field. The vulnerability was discovered and disclosed in January 2020 (CVE Details, Medium Blog).
The vulnerability exists in the ticket creation functionality where authenticated users can manipulate the email ID field in requests. By capturing and modifying the request in tools like Burp Suite, an attacker can replace their email ID with a victim's email ID, causing tickets to be created under the victim's account without proper authentication (Medium Blog).
When exploited, this vulnerability allows authenticated users to create tickets on behalf of other users without their authorization. This could lead to unauthorized ticket creation, potential impersonation, and compromise of the ticketing system's integrity (CVE Details).
The vulnerability was addressed in versions after Prototype 1.6.0.1. Organizations using affected versions should upgrade to a patched version. Additionally, implementing proper access controls and validation of user permissions during ticket creation can help prevent exploitation (Prototype Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."