An insecure random number generation vulnerability in BlaB! AX, BlaB! AX Pro, BlaB! WS (client), and BlaB! WS Pro (client) version 19.11 allows an attacker (with a guest or user session cookie) to escalate privileges by retrieving the cookie salt value and creating a valid session cookie for an arbitrary user or admin.
References
Link | Resource |
---|---|
https://justblab.com/latest-news | Vendor Advisory |
https://justblab.com/latest-news | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://justblab.com/latest-news - Vendor Advisory |
Information
Published : 2020-02-28 21:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9449
Mitre link : CVE-2020-9449
CVE.ORG link : CVE-2020-9449
JSON object : View
Products Affected
justblab
- blab\!_ws
- blab\!_ax_pro
- blab\!_ax
- blab\!_ws_pro
CWE
CWE-330
Use of Insufficiently Random Values