CVE-2020-9449
Severity CVSS v4.0:
Pending analysis
Type:
CWE-330
Use of Insufficiently Random Value
Publication date:
28/02/2020
Last modified:
04/03/2020
Description
An insecure random number generation vulnerability in BlaB! AX, BlaB! AX Pro, BlaB! WS (client), and BlaB! WS Pro (client) version 19.11 allows an attacker (with a guest or user session cookie) to escalate privileges by retrieving the cookie salt value and creating a valid session cookie for an arbitrary user or admin.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:justblab:blab\!_ax:19.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:justblab:blab\!_ax_pro:19.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:justblab:blab\!_ws:19.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:justblab:blab\!_ws_pro:19.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



