Impact
An authorization bypass vulnerability was discovered in the administration pages of the tutoring application. When a standard user (logged in but without administrator privileges) attempts to access a resource under /api/admin/, the system detects the error but does not block the request.
As a result, sensitive data is still transmitted by the server in the request (GET), and modification actions such as campaign creation (POST) are executed successfully despite the FORBIDDEN error message. All /api/admin/* endpoints are affected.
Remediation
The issue was resolved by adding the missing c.Abort() instruction in the Gin authentication middleware (commit 15ae474). This instruction immediately interrupts the processing chain if the user is not an administrator.
Workarounds
There is no workaround other than applying the fix in the source code.
Resources:
Credits
INSATutorat thanks the Master 2 SSI 25-26 team at the University of Rouen Normandie for their research work on this project.
- Malak Bekkai
- Matthieu Espada Mora
- Amen Allah Khalf Allah
- Liam Laouenan
- Neila Ould Slimane
- Lucas Thomire
This advisory was translated from French to English by GitHub Copilot.