Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and can then use that cookie immediately for admin access,
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/49435 | Exploit Third Party Advisory VDB Entry |
https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html | Exploit Third Party Advisory |
https://www.netsia.com/#netsiaseba | Vendor Advisory |
Configurations
Information
Published : 2021-01-16 19:15
Updated : 2021-01-27 12:41
NVD link : CVE-2021-3113
Mitre link : CVE-2021-3113
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
netsia
- seba\+