SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session.
References
Link | Resource |
---|---|
https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/ | Third Party Advisory |
https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/ - Third Party Advisory |
Information
Published : 2018-05-16 14:29
Updated : 2024-11-21 03:41
NVD link : CVE-2018-10240
Mitre link : CVE-2018-10240
CVE.ORG link : CVE-2018-10240
JSON object : View
Products Affected
solarwinds
- serv-u
CWE
CWE-331
Insufficient Entropy