cve/2024/CVE-2024-23831.md

18 lines
1006 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-23831](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23831)
![](https://img.shields.io/static/v1?label=Product&message=LedgerSMB&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.10.30%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
LedgerSMB is a free web-based double-entry accounting system. When a LedgerSMB database administrator has an active session in /setup.pl, an attacker can trick the admin into clicking on a link which automatically submits a request to setup.pl without the admin's consent. This request can be used to create a new user account with full application (/login.pl) privileges, leading to privilege escalation. The vulnerability is patched in versions 1.10.30 and 1.11.9.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/mmedhat1910/masters-testing-apps