Home

Description

Quark Drive before 0.8.5 contains a mass assignment vulnerability in the POST /update endpoint that allows authenticated attackers to overwrite administrator credentials by posting an arbitrary webui object to the config_data dictionary. Attackers can exploit insufficient deny-list filtering to permanently replace stored login credentials, lock out legitimate administrators, and gain persistent access to all configured tasks, cloud tokens, and notification services.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-13 | Updated 2026-05-14 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

Default status
affected

Any version before 0.8.5
affected

ea8377a596446291953dbe36e2d119d85bcd865b (git)
unaffected

Credits

Katriel Moses finder

References

github.com/Cp0204/quark-auto-save/releases/tag/v0.8.5 release-notes

github.com/...ommit/ea8377a596446291953dbe36e2d119d85bcd865b patch

www.vulncheck.com/...k-drive-mass-assignment-via-post-update third-party-advisory

cve.org (CVE-2026-45229)

nvd.nist.gov (CVE-2026-45229)

Download JSON