CVE-2024-50633
Description
A Broken Object Level Authorization (BOLA) vulnerability in Indico through 3.3.5 allows attackers to read information by sending a crafted POST request to the component /api/principals. NOTE: this is disputed by the Supplier because the product intentionally lets all users retrieve certain information about other user accounts (this functionality is, in the current design, not restricted to any privileged roles such as event organizer).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A disputed BOLA vulnerability in Indico through 3.3.5 allows unauthenticated retrieval of user information via a crafted POST to /api/principals.
What the vulnerability is
CVE-2024-50633 describes a Broken Object Level Authorization (BOLA) issue in the Indico event management platform (through version 3.3.5). The vulnerability resides in the /api/principals endpoint, which accepts a crafted POST request containing a JSON payload with a user identifier (e.g., {"values": ["User:2301"]}). By changing the user ID in the request, an attacker can retrieve information about other user accounts [1][4].
How it is exploited
Exploitation requires only that the attacker can register an account on the Indico instance and send a POST request to the /api/principals endpoint. The official repository and the discoverer's write-up both note that the endpoint was introduced in Indico v2.2 and remains accessible in v3.3.5 [3][4]. The attack does not require any prior privileges beyond having a valid session, and no administrator or organizer role is needed [1].
Impact
By enumerating user IDs, an attacker can extract personal information from other users' accounts, including names, email addresses, or other profile data exposed by the endpoint. The impact is a breach of confidentiality for user information, potentially enabling further targeted attacks [1][4].
Mitigation status
The Indico developers dispute the vulnerability classification, stating that the /api/principals endpoint is intentionally open to all authenticated users to allow searching for other users by name or email, which is a design feature, not a bug [3]. No official patch has been released as of the publication date. However, the developers have acknowledged that a future configuration option might restrict this endpoint to event organizers only [3]. Users wishing to limit exposure can apply network-level access controls or monitor logs for suspicious queries.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
indicoPyPI | >= 3.2.9, < 3.3.3 | 3.3.3 |
Affected products
3- CERN/Indicov5Range: 2.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-3wg7-r7q5-r2jfghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-50633ghsaADVISORY
- github.com/cetinpy/CVE-2024-50633/issues/1ghsaWEB
News mentions
0No linked articles in our index yet.