In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. Due to the use of Passport.js, this could lead to privilege escalation.
References
Link | Resource |
---|---|
https://github.com/aprendecondedos/dedos-web/pull/1 | Issue Tracking Third Party Advisory |
https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-05 15:29
Updated : 2018-07-20 14:36
NVD link : CVE-2018-10813
Mitre link : CVE-2018-10813
CVE.ORG link : CVE-2018-10813
JSON object : View
Products Affected
aprendecondedos
- dedos-web
CWE
CWE-798
Use of Hard-coded Credentials