CVE-2021-3113

Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and can then use that cookie immediately for admin access,
Configurations

Configuration 1 (hide)

cpe:2.3:a:netsia:seba\+:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:20

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/49435 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/49435 - Exploit, Third Party Advisory, VDB Entry
References () https://www.netsia.com/#netsiaseba - Vendor Advisory () https://www.netsia.com/#netsiaseba - Vendor Advisory
References () https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html - Exploit, Third Party Advisory () https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html - Exploit, Third Party Advisory

Information

Published : 2021-01-17 03:15

Updated : 2024-11-21 06:20


NVD link : CVE-2021-3113

Mitre link : CVE-2021-3113

CVE.ORG link : CVE-2021-3113


JSON object : View

Products Affected

netsia

  • seba\+
CWE
CWE-425

Direct Request ('Forced Browsing')