CVE-2017-18486

Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jitbit:helpdesk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:20

Type Values Removed Values Added
References () https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass - Exploit, Third Party Advisory () https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass - Exploit, Third Party Advisory
References () https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-Authentication.html - Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-Authentication.html - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42776 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42776 - Exploit, Third Party Advisory, VDB Entry
References () https://www.trustedsec.com/2017/09/full-disclosure-jitbit-helpdesk-authentication-bypass-0-day - Third Party Advisory () https://www.trustedsec.com/2017/09/full-disclosure-jitbit-helpdesk-authentication-bypass-0-day - Third Party Advisory

Information

Published : 2019-08-09 17:15

Updated : 2024-11-21 03:20


NVD link : CVE-2017-18486

Mitre link : CVE-2017-18486

CVE.ORG link : CVE-2017-18486


JSON object : View

Products Affected

jitbit

  • helpdesk
CWE
CWE-332

Insufficient Entropy in PRNG