Vulnerability Description
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dalmark | Systeam Enterprise Resource Planning | 2.22.8 |
References
- https://www.systeam.com.br/cve/broken-access-control-en.txtVendor Advisory
- https://www.systeam.com.br/cve/broken-access-control-en.txtVendor Advisory
FAQ
What is CVE-2021-44877?
CVE-2021-44877 is a vulnerability with a CVSS score of 7.5 (HIGH). Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, a...
How severe is CVE-2021-44877?
CVE-2021-44877 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-44877?
Check the references section above for vendor advisories and patch information. Affected products include: Dalmark Systeam Enterprise Resource Planning.