CVE-2021-29012

DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is logged out. In other words, the cookie is functionally equivalent to a static password, and thus provides permanent access if stolen.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dmasoftlab:dma_radius_manager:4.4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/1d8/publications/tree/main/cve-2021-29012 - Exploit, Third Party Advisory () https://github.com/1d8/publications/tree/main/cve-2021-29012 - Exploit, Third Party Advisory
References () https://sourceforge.net/projects/radiusmanager/ - Product, Third Party Advisory () https://sourceforge.net/projects/radiusmanager/ - Product, Third Party Advisory

Information

Published : 2021-04-02 13:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-29012

Mitre link : CVE-2021-29012

CVE.ORG link : CVE-2021-29012


JSON object : View

Products Affected

dmasoftlab

  • dma_radius_manager
CWE
CWE-287

Improper Authentication