Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fcvh-jjcr-m6hg

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Joovili 3.1.4 allows remote attackers to bypass authentication and gain privileges as other users, including the administrator, by setting the (1) session_id, session_logged_in, and session_username cookies for user privileges; (2) session_admin_id, session_admin_username, and session_admin cookies for admin privileges; and (3) session_staff_id, session_staff_username, and session_staff cookies for staff users.

Joovili 3.1.4 allows remote attackers to bypass authentication and gain privileges as other users, including the administrator, by setting the (1) session_id, session_logged_in, and session_username cookies for user privileges; (2) session_admin_id, session_admin_username, and session_admin cookies for admin privileges; and (3) session_staff_id, session_staff_username, and session_staff cookies for staff users.

EPSS

Процентиль: 82%
0.01747
Низкий

Дефекты

CWE-287

Связанные уязвимости

nvd
почти 17 лет назад

Joovili 3.1.4 allows remote attackers to bypass authentication and gain privileges as other users, including the administrator, by setting the (1) session_id, session_logged_in, and session_username cookies for user privileges; (2) session_admin_id, session_admin_username, and session_admin cookies for admin privileges; and (3) session_staff_id, session_staff_username, and session_staff cookies for staff users.

EPSS

Процентиль: 82%
0.01747
Низкий

Дефекты

CWE-287