CVE-2021-27228

An issue was discovered in Shinobi through ocean version 1. lib/auth.js has Incorrect Access Control. Valid API Keys are held in an internal JS Object. Therefore an attacker can use JS Proto Method names (such as constructor or hasOwnProperty) to convince the System that the supplied API Key exists in the underlying JS object, and consequently achieve complete access to User/Admin/Super API functions, as demonstrated by a /super/constructor/accounts/list URI.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shinobi:shinobi_pro:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:57

Type Values Removed Values Added
References () https://gitlab.com/Shinobi-Systems/Shinobi/-/merge_requests/286 - Patch, Third Party Advisory () https://gitlab.com/Shinobi-Systems/Shinobi/-/merge_requests/286 - Patch, Third Party Advisory
References () https://gitlab.com/Shinobi-Systems/Shinobi/-/tags - Patch, Third Party Advisory () https://gitlab.com/Shinobi-Systems/Shinobi/-/tags - Patch, Third Party Advisory
References () https://shinobi.video/ - Product () https://shinobi.video/ - Product

Information

Published : 2021-02-22 17:15

Updated : 2024-11-21 05:57


NVD link : CVE-2021-27228

Mitre link : CVE-2021-27228

CVE.ORG link : CVE-2021-27228


JSON object : View

Products Affected

shinobi

  • shinobi_pro
CWE
CWE-798

Use of Hard-coded Credentials