CVE-2026-34406: Sicherheitslücke in APTRS lässt sich zu Privilege Escalation missbrauchen
⚠️ CVE-Referenzen:
CVE-2026-34406
Zusammenfassung
In der Penetrationstestings-Software APTRS bis Version 2.0.0 konnte jeder Nutzer, der Zugriff auf den edit_user-Endpunkt hatte, seine eigenen Berechtigungen auf "Superuser" erhöhen. Ursache war, dass das CustomUserSerializer-Feld "is_superuser" schreibbar war, ohne zusätzliche Validierung. Durch Setzen dieses Flags erlangte man unkontrollierte Zugriffsrechte. Das Problem wurde in Version 2.0.1 behoben.
APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. Prior to version 2.0.1, the edit_user endpoint (POST /api/auth/edituser/) allows Any user who can reach that endpoint and submit crafted permission to escalate their own account (or any other account) to superuser by including "is_superuser": true in the request body. The root cause is that CustomUserSerializer explicitly includes is_superuser in its fields list but omits it from read_only_fields, making it a writable field. The edit_user view performs no additional validation to prevent non-superusers from modifying this field. Once is_superuser is set to true, gaining unrestricted access to all application functionality without requiring re-authentication. This issue has been patched in version 2.0.1.
Quelle: app.opencve.io