Описание
Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.0.0 (включая) до 3.2.4 (включая)
cpe:2.3:a:linotp:linotp:*:*:*:*:*:*:*:*
Конфигурация 2Версия от 3.0.0 (включая) до 3.2.4 (включая)
cpe:2.3:a:linotp:virtual_appliance:*:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00142
Низкий
6.8 Medium
CVSS3
Дефекты
CWE-362
Связанные уязвимости
CVSS3: 6.8
github
около 2 лет назад
Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal.
EPSS
Процентиль: 35%
0.00142
Низкий
6.8 Medium
CVSS3
Дефекты
CWE-362