cve/2023/CVE-2023-35794.md

19 lines
817 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-35794](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35794)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking
- https://github.com/nomi-sec/PoC-in-GitHub