Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g8rj-9f8j-3x3w

Опубликовано: 15 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.

Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.

EPSS

Процентиль: 33%
0.00133
Низкий

7.5 High

CVSS3

Дефекты

CWE-284
CWE-384

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.

EPSS

Процентиль: 33%
0.00133
Низкий

7.5 High

CVSS3

Дефекты

CWE-284
CWE-384