CVE-2020-29667

In Lan ATMService M3 ATM Monitoring System 6.1.0, a remote attacker able to use a default cookie value, such as PHPSESSID=LANIT-IMANAGER, can achieve control over the system because of Insufficient Session Expiration.
References
Link Resource
http://lanatmservice.ru/ Vendor Advisory
https://github.com/jet-pentest/CVE-2020-29667 Third Party Advisory
http://lanatmservice.ru/ Vendor Advisory
https://github.com/jet-pentest/CVE-2020-29667 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lanatmservice:m3_atm_monitoring_system:6.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:24

Type Values Removed Values Added
References () http://lanatmservice.ru/ - Vendor Advisory () http://lanatmservice.ru/ - Vendor Advisory
References () https://github.com/jet-pentest/CVE-2020-29667 - Third Party Advisory () https://github.com/jet-pentest/CVE-2020-29667 - Third Party Advisory

Information

Published : 2020-12-10 09:15

Updated : 2024-11-21 05:24


NVD link : CVE-2020-29667

Mitre link : CVE-2020-29667

CVE.ORG link : CVE-2020-29667


JSON object : View

Products Affected

lanatmservice

  • m3_atm_monitoring_system
CWE
CWE-613

Insufficient Session Expiration