In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. Due to the use of Passport.js, this could lead to privilege escalation.
References
Link | Resource |
---|---|
https://github.com/aprendecondedos/dedos-web/pull/1 | Issue Tracking Third Party Advisory |
https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune | Exploit Third Party Advisory |
https://github.com/aprendecondedos/dedos-web/pull/1 | Issue Tracking Third Party Advisory |
https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/aprendecondedos/dedos-web/pull/1 - Issue Tracking, Third Party Advisory | |
References | () https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune - Exploit, Third Party Advisory |
Information
Published : 2018-06-05 15:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10813
Mitre link : CVE-2018-10813
CVE.ORG link : CVE-2018-10813
JSON object : View
Products Affected
aprendecondedos
- dedos-web
CWE
CWE-798
Use of Hard-coded Credentials