An issue was discovered in Shinobi through ocean version 1. lib/auth.js has Incorrect Access Control. Valid API Keys are held in an internal JS Object. Therefore an attacker can use JS Proto Method names (such as constructor or hasOwnProperty) to convince the System that the supplied API Key exists in the underlying JS object, and consequently achieve complete access to User/Admin/Super API functions, as demonstrated by a /super/constructor/accounts/list URI.
References
Link | Resource |
---|---|
https://gitlab.com/Shinobi-Systems/Shinobi/-/merge_requests/286 | Patch Third Party Advisory |
https://gitlab.com/Shinobi-Systems/Shinobi/-/tags | Patch Third Party Advisory |
https://shinobi.video/ | Product |
https://gitlab.com/Shinobi-Systems/Shinobi/-/merge_requests/286 | Patch Third Party Advisory |
https://gitlab.com/Shinobi-Systems/Shinobi/-/tags | Patch Third Party Advisory |
https://shinobi.video/ | Product |
Configurations
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/Shinobi-Systems/Shinobi/-/merge_requests/286 - Patch, Third Party Advisory | |
References | () https://gitlab.com/Shinobi-Systems/Shinobi/-/tags - Patch, Third Party Advisory | |
References | () https://shinobi.video/ - Product |
Information
Published : 2021-02-22 17:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27228
Mitre link : CVE-2021-27228
CVE.ORG link : CVE-2021-27228
JSON object : View
Products Affected
shinobi
- shinobi_pro
CWE
CWE-798
Use of Hard-coded Credentials