EyesOfNetwork 5.3-10 uses an integer of between 8 and 10 digits for the session ID, which might be leveraged for brute-force authentication bypass (such as in CVE-2021-27513 exploitation).
References
Link | Resource |
---|---|
https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py | Exploit Third Party Advisory |
https://github.com/EyesOfNetworkCommunity/eonweb/issues/87 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-02-21T23:05:32
Updated: 2021-02-21T23:05:32
Reserved: 2021-02-21T00:00:00
Link: CVE-2021-27514
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-02-22T00:15:12.370
Modified: 2021-02-26T20:04:06.097
Link: CVE-2021-27514
JSON object: View
Redhat Information
No data.
CWE