Описание
All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerability that allows attackers to set a predefined PHP session identifier during the login process. Attackers can forge HTTP GET requests to welcome.php with a manipulated session token to bypass authentication and potentially execute cross-site request forgery attacks.
All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerability that allows attackers to set a predefined PHP session identifier during the login process. Attackers can forge HTTP GET requests to welcome.php with a manipulated session token to bypass authentication and potentially execute cross-site request forgery attacks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-36913
- https://exchange.xforce.ibmcloud.com/vulnerabilities/186246
- https://packetstorm.news/files/id/158703
- https://packetstormsecurity.com/files/158703
- https://www.enlogic-show.com/index.dhtml/23695c31af422b939dd049908/-/deDE/-/CS/-/support/changelog
- https://www.vulncheck.com/advisories/all-dynamics-software-enlogicshow-session-fixation-authentication-bypass
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5577.php
Связанные уязвимости
All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerability that allows attackers to set a predefined PHP session identifier during the login process. Attackers can forge HTTP GET requests to welcome.php with a manipulated session token to bypass authentication and potentially execute cross-site request forgery attacks.