CVE-2020-8434

Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:*
cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:*
cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://medium.com/%40mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80 - () https://medium.com/%40mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80 -

07 Nov 2023, 03:26

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80', 'name': 'https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80 -

Information

Published : 2020-05-19 13:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8434

Mitre link : CVE-2020-8434

CVE.ORG link : CVE-2020-8434


JSON object : View

Products Affected

jenzabar

  • internet_campus_solution
CWE
CWE-384

Session Fixation