An improper authentication vulnerability can be exploited through a race condition that occurs in Ellucian Banner Web Tailor 8.8.3, 8.8.4, and 8.9 and Banner Enterprise Identity Services 8.3, 8.3.1, 8.3.2, and 8.4, in conjunction with SSO Manager. This vulnerability allows remote attackers to steal a victim's session (and cause a denial of service) by repeatedly requesting the initial Banner Web Tailor main page with the IDMSESSID cookie set to the victim's UDCID, which in the case tested is the institutional ID. During a login attempt by a victim, the attacker can leverage the race condition and will be issued the SESSID that was meant for this victim.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152856/Ellucian-Banner-Web-Tailor-Banner-Enterprise-Identity-Services-Improper-Authentication.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/May/18 | Mailing List Third Party Advisory |
https://ecommunities.ellucian.com/message/252749#252749 | Permissions Required |
https://ecommunities.ellucian.com/message/252810#252810 | Permissions Required |
https://raw.githubusercontent.com/JoshuaMulliken/CVE-2019-8978/master/README.txt | Third Party Advisory |
https://seclists.org/bugtraq/2019/May/31 | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-14T18:37:43
Updated: 2019-05-14T18:41:58
Reserved: 2019-02-20T00:00:00
Link: CVE-2019-8978
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-05-14T19:29:00.450
Modified: 2021-07-21T11:39:23.747
Link: CVE-2019-8978
JSON object: View
Redhat Information
No data.