lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <LDDQYiz--3-0@tutamail.com> Date: Wed, 23 May 2018 21:16:19 +0200 (CEST) From: <jerinjoy@...amail.com> To: <fulldisclosure@...lists.org> Subject: [FD] Authentication Bypass in Accellion Kiteworks [Suggested description] > Authentication Bypass vulnerability in Accellionkiteworks before > 2017.01.00 allows remote attackers to executecertain API calls on > behalf of a web user using a gathered token via aPOST request to > /oauth/token. > > ------------------------------------------ > > [Vulnerability Type] > Incorrect Access Control > > ------------------------------------------ > > [Vendor of Product] > Accellion > > ------------------------------------------ > > [Affected Product Code Base] > Kiteworks - Affected Version: kw2016.04.12, FixedVersion: v2017.01.00 > > ------------------------------------------ > > [Affected Component] > web user, token, API calls > > ------------------------------------------ > > [Attack Type] > Remote > > ------------------------------------------ > > [Impact Information Disclosure] > true > > ------------------------------------------ > > [CVE Impact Other] > Can create user accounts > > ------------------------------------------ > > [Attack Vectors] > To exploit vulnerability, someone can gather thetoken by submitting a POST request to /oauth/token. > > ------------------------------------------ > > [Has vendor confirmed or acknowledged thevulnerability?] true > > ------------------------------------------ > > [Discoverer] > Jerin Joy Email: Jerinjoy@...amail.com <mailto:Jerinjoy@...amail.com> _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists