Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.
References
Link | Resource |
---|---|
https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://www.tangro.de/ | Product |
https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://www.tangro.de/ | Product |
Configurations
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 4.2 |
References | () https://blog.to.com/advisory-tangro-bwf-1-17-5-multiple-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://www.tangro.de/ - Product |
Information
Published : 2020-12-18 10:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26172
Mitre link : CVE-2020-26172
CVE.ORG link : CVE-2020-26172
JSON object : View
Products Affected
tangro
- business_workflow
CWE
CWE-294
Authentication Bypass by Capture-replay