Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password change or a session termination. Also, it is transmitted as a GET parameter. This is fixed in 10.1.
References
Link | Resource |
---|---|
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-02-12 06:29
Updated : 2018-03-05 11:58
NVD link : CVE-2017-18179
Mitre link : CVE-2017-18179
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
progress
- sitefinity