Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m697-r4gm-82f3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application.

SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application.

EPSS

Процентиль: 60%
0.00397
Низкий

Связанные уязвимости

CVSS3: 8.1
nvd
больше 5 лет назад

SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application.

EPSS

Процентиль: 60%
0.00397
Низкий