Логотип exploitDog
bind:CVE-2019-13337
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13337

Количество 2

Количество 2

nvd логотип

CVE-2019-13337

больше 6 лет назад

In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rvp3-fp54-7x54

больше 3 лет назад

In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13337

In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required.

CVSS3: 7.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-rvp3-fp54-7x54

In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу