120 lines
4.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-8434",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-05-19T13:15:12.387",
"lastModified": "2020-05-27T14:53:29.833",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented)."
},
{
"lang": "es",
"value": "Jenzabar JICS (tambi\u00e9n se conoce como Internet Campus Solution) versiones anteriores a 9.0.1 Patch 3, versiones 9.1 anteriores a 9.1.2, Patch 2 y versiones 9.2 anteriores a 9.2.2 Patch 8, contiene cookies de sesi\u00f3n que son una funci\u00f3n determin\u00edstica del nombre de usuario. Se presenta una contrase\u00f1a embebida para suministrar una fuente PBKDF hacia AES para cifrar un nombre de usuario y codificarlo en base64 en una cookie del lado del cliente para una autenticaci\u00f3n de sesi\u00f3n persistente. Al conocer la clave y el algoritmo, un atacante puede seleccionar cualquier nombre de usuario, cifrarlo, codificarlo en base64 y guardarlo en su navegador con el formato de cookie JICSLoginCookie correcto para suplantar a cualquier usuario real en la base de datos JICS sin la necesidad de autenticarse (o verificaci\u00f3n con MFA si es implementado)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.0.1",
"matchCriteriaId": "3B4DEC59-91F5-4233-94CD-7E035A8B0247"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndIncluding": "9.1.2",
"matchCriteriaId": "8EFFBB89-EFC0-4FD0-A91B-6D919E2301A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndIncluding": "9.2.2",
"matchCriteriaId": "EC2B8E0B-0D84-4748-8125-927790F99CFD"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}