A misconfiguration in Web-Sesame 2020.1.1.3375 allows an unauthenticated attacker to download the source code of the application, facilitating its comprehension (code review). Specifically, JavaScript source maps were inadvertently included in the production Webpack configuration. These maps contain sources used to generate the bundle, configuration settings (e.g., API keys), and developers' comments.
References
Link | Resource |
---|---|
https://blog.bssi.fr/source-code-vulnerability-disclosure-discovered-in-the-web-sesame-application-of-til-technologies/ | Exploit Third Party Advisory |
https://blog.bssi.fr/vulnerabilite-de-divulgation-de-code-source-identifiee-au-sein-de-lapplication-web-sesame-de-til-technologies/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-06 21:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-29041
Mitre link : CVE-2020-29041
CVE.ORG link : CVE-2020-29041
JSON object : View
Products Affected
sesame-system
- web-sesame
CWE