Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fmc9-4f7f-vmq2

Опубликовано: 26 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 7.7

Описание

Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.

Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.

EPSS

Процентиль: 7%
0.00026
Низкий

7.7 High

CVSS4

Дефекты

CWE-291

Связанные уязвимости

nvd
13 дней назад

Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.

EPSS

Процентиль: 7%
0.00026
Низкий

7.7 High

CVSS4

Дефекты

CWE-291