IceCMS is a content management system based on Spring Boot+Vue front-end and back-end separation.
IceCMS v2.0.1 has an unauthorized access level and is located in the Personal Information Modification area. Through the ordinary user, the administrator user's account, personal information and password can be modified, resulting in vertical override. The back-end code determines the identity based solely on the userId, which is how the vulnerability arises. It's very harmful.
Vulnerability points: http://localhost:9528/userinfo/index
Let's first create an account test 1, Click on update and capture the package
And then we grab the administrator's package and we know that userId is 3
Then go back to the package for our previous test user, change the userId to 3, and change the name and password Send the packet. Success
Discovery successful The administrator account has been changed after checking the database
Login account found that has been modified This is the front-end page