An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/290.html | Technical Description |
https://github.com/liftoff/GateOne/issues/728 | Exploit Issue Tracking Third Party Advisory |
https://cwe.mitre.org/data/definitions/290.html | Technical Description |
https://github.com/liftoff/GateOne/issues/728 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 05:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://cwe.mitre.org/data/definitions/290.html - Technical Description | |
References | () https://github.com/liftoff/GateOne/issues/728 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2021-10-06 13:15
Updated : 2024-11-21 05:08
NVD link : CVE-2020-19003
Mitre link : CVE-2020-19003
CVE.ORG link : CVE-2020-19003
JSON object : View
Products Affected
liftoffsoftware
- gate_one
CWE
CWE-290
Authentication Bypass by Spoofing