An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file. Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.
History

Tue, 22 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 22 Apr 2025 09:00:00 +0000

Type Values Removed Values Added
Description An authorization bypass in Unblu Spark allows a participant of a conversation to replace an existing, uploaded file. Every uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly.
Title Replace uploaded files knowing the file upload ID
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published: 2025-04-22T08:51:41.681Z

Updated: 2025-04-22T18:55:44.071Z

Reserved: 2025-04-11T14:18:18.443Z

Link: CVE-2025-3519

cve-icon Vulnrichment

Updated: 2025-04-22T18:55:38.847Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-22T09:15:15.660

Modified: 2025-04-23T14:08:13.383

Link: CVE-2025-3519

cve-icon Redhat

No data.