In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. Due to the use of Passport.js, this could lead to privilege escalation.
References
Link | Resource |
---|---|
https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune | Exploit Third Party Advisory |
https://github.com/aprendecondedos/dedos-web/pull/1 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2018-06-05 08:29
Updated : 2018-07-20 07:36
NVD link : CVE-2018-10813
Mitre link : CVE-2018-10813
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
aprendecondedos
- dedos-web