CVE-2024-26331

ReCrystallize Server 5.10.0.0 uses a authorization mechanism that relies on the value of a cookie, but it does not bind the cookie value to a session ID. Attackers can easily modify the cookie value, within a browser or by implementing client-side code outside of a browser. Attackers can bypass the authentication mechanism by modifying the cookie to contain an expected value.
Configurations

No configuration.

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/ - () https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/ -
References () https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm - () https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm -

06 Aug 2024, 19:35

Type Values Removed Values Added
Summary
  • (es) ReCrystallize Server 5.10.0.0 utiliza un mecanismo de autorización que se basa en el valor de una cookie, pero no vincula el valor de la cookie a una ID de sesión. Los atacantes pueden modificar fácilmente el valor de la cookie, dentro de un navegador o implementando código del lado del cliente fuera de un navegador. Los atacantes pueden eludir el mecanismo de autenticación modificando la cookie para que contenga un valor esperado.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-287

30 Apr 2024, 19:35

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-30 19:15

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26331

Mitre link : CVE-2024-26331

CVE.ORG link : CVE-2024-26331


JSON object : View

Products Affected

No product.

CWE
CWE-287

Improper Authentication