an attacker can access data from other organizers
Proof of Concept
user1
belongs to org1
and creates event1
user2
belongs to org2
and creates event2
user2
requests the e-mail log: GET /admin/api/event/event2/email/?page=0&search= HTTP/1.1
user2
replaces event2
with event1
and re-runs the request: GET /admin/api/event/event1/email/?page=0&search= HTTP/1.1
user2
receives email log from event1
which belongs to another organization
an attacker can access data from other organizers
Proof of Concept
user1
belongs toorg1
and createsevent1
user2
belongs toorg2
and createsevent2
user2
requests the e-mail log:GET /admin/api/event/event2/email/?page=0&search= HTTP/1.1
user2
replacesevent2
withevent1
and re-runs the request:GET /admin/api/event/event1/email/?page=0&search= HTTP/1.1
user2
receives email log fromevent1
which belongs to another organization