Skip to content

Latest commit

 

History

History
39 lines (20 loc) · 1.59 KB

ruoyi_insecure_role_assignments.md

File metadata and controls

39 lines (20 loc) · 1.59 KB

The ruoyi project has insecure role assignments

The ruoyi project, a GitHub project with 6.6k stars and also open-sourced on gitee, has a vulnerability that could allow a user in a low-privilege role to give themselves a high-privilege role, which could lead to elevation of privilege.

Version & Reference

ruoyi project 4.8.0

https://gitee.com/y_project/RuoYi

https://github.com/yangzongzhuan/RuoYi

https://ruoyi.vip/

Vulnerability causes

1735476753870

The interface is to change user information and also make changes to the user's role. When updating, the interface only checks if the user can update the user role, but does not check if the updated role has higher privileges. Therefore the interface can assign itself a role with higher privileges.

Vulnerability reproduce & Impact

1735476964279

1735477019259

There are two roles in the system and the first role has more privileges than the second role, create a user with the second role privileges.

1735477151773

1735477254165

This user assigns himself the first role, which is the role with higher privileges. Select and assign.

1735477374444

A higher privileged role is successfully assigned to the user, and other more accessible interfaces can be seen in the left directory.

This vulnerability requires that a higher privileged role exists on the system and that the attacker has user administrative privileges. The impact is that elevation of privilege is possible.