An issue was discovered in Scytl sVote 2.1. Because the IP address from an X-Forwarded-For header (which can be manipulated client-side) is used for the internal application logs, an attacker can inject wrong IP addresses into these logs.
References
Link | Resource |
---|---|
https://suid.ch/research/CVE-2019-25023.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-02-26 21:15
Updated : 2021-03-05 09:51
NVD link : CVE-2019-25023
Mitre link : CVE-2019-25023
JSON object : View
CWE
CWE-290
Authentication Bypass by Spoofing
Products Affected
scytl
- secure_vote