ReCrystallize Server 5.10.0.0 uses a authorization mechanism that relies on the value of a cookie, but it does not bind the cookie value to a session ID. Attackers can easily modify the cookie value, within a browser or by implementing client-side code outside of a browser. Attackers can bypass the authentication mechanism by modifying the cookie to contain an expected value.
References
Configurations
No configuration.
History
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/ - | |
References | () https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm - |
06 Aug 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-287 |
30 Apr 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-30 19:15
Updated : 2024-11-21 09:02
NVD link : CVE-2024-26331
Mitre link : CVE-2024-26331
CVE.ORG link : CVE-2024-26331
JSON object : View
Products Affected
No product.
CWE
CWE-287
Improper Authentication