Datalust Seq before 4.2.605 is vulnerable to Authentication Bypass (with the attacker obtaining admin access) via '"Name":"isauthenticationenabled","Value":false' in an api/settings/setting-isauthenticationenabled PUT request.
References
Link | Resource |
---|---|
https://github.com/datalust/seq-tickets/issues/675 | Patch Third Party Advisory |
https://medium.com/stolabs/bypass-admin-authentication-on-seq-17f0f9e02732 | Exploit Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/45136/ | Exploit VDB Entry Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-03-14T00:00:00
Updated: 2018-08-04T09:57:01
Reserved: 2018-03-13T00:00:00
Link: CVE-2018-8096
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-03-14T00:29:00.547
Modified: 2019-02-28T18:07:58.787
Link: CVE-2018-8096
JSON object: View
Redhat Information
No data.
CWE