Files
CVEs-PoC/2021/CVE-2021-41594.md
2025-09-29 21:09:30 +02:00

19 lines
958 B
Markdown

### [CVE-2021-41594](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41594)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
In RSA Archer 6.9.SP1 P3, if some application functions are precluded by the Administrator, this can be bypassed by intercepting the API request at the /api/V2/internal/TaskPermissions/CheckTaskAccess endpoint. If the parameters of this request are replaced with empty fields, the attacker achieves access to the precluded functions.
### POC
#### Reference
- https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
- https://www.rsa.com/en-us/company/vulnerability-response-policy
#### Github
No PoCs found on GitHub currently.