CVE-2020-8434
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/05/2020
Last modified:
07/11/2023
Description
Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented).
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:* | 9.0.1 (including) | |
cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:* | 9.1.0 (including) | 9.1.2 (including) |
cpe:2.3:a:jenzabar:internet_campus_solution:*:*:*:*:*:*:*:* | 9.2.0 (including) | 9.2.2 (including) |
To consult the complete list of CPE names with products and versions, see this page