An improper authentication vulnerability can be exploited through a race condition that occurs in Ellucian Banner Web Tailor 8.8.3, 8.8.4, and 8.9 and Banner Enterprise Identity Services 8.3, 8.3.1, 8.3.2, and 8.4, in conjunction with SSO Manager. This vulnerability allows remote attackers to steal a victim's session (and cause a denial of service) by repeatedly requesting the initial Banner Web Tailor main page with the IDMSESSID cookie set to the victim's UDCID, which in the case tested is the institutional ID. During a login attempt by a victim, the attacker can leverage the race condition and will be issued the SESSID that was meant for this victim.
References
Link | Resource |
---|---|
https://seclists.org/bugtraq/2019/May/31 | Mailing List Third Party Advisory |
https://raw.githubusercontent.com/JoshuaMulliken/CVE-2019-8978/master/README.txt | Third Party Advisory |
https://ecommunities.ellucian.com/message/252810#252810 | Permissions Required |
https://ecommunities.ellucian.com/message/252749#252749 | Permissions Required |
http://seclists.org/fulldisclosure/2019/May/18 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/152856/Ellucian-Banner-Web-Tailor-Banner-Enterprise-Identity-Services-Improper-Authentication.html | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-05-14 12:29
Updated : 2021-07-21 04:39
NVD link : CVE-2019-8978
Mitre link : CVE-2019-8978
JSON object : View
CWE
Products Affected
ellucian
- banner_enterprise_identity_services
- banner_web_tailor