Description
Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.
Problem types
CWE-285: Improper Authorization
CWE-639: Authorization Bypass Through User-Controlled Key
CWE-862: Missing Authorization
Product status
References
github.com/...rallly/security/advisories/GHSA-44w7-pf32-gv5m
github.com/lukevella/rallly/releases/tag/v4.5.4