config/initializers/secret_token.rb in Fat Free CRM before 0.12.1 has a fixed FatFreeCRM::Application.config.secret_token value, which makes it easier for remote attackers to spoof signed cookies by referring to the key in the source code.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2013/12/28/2 - | |
References | () http://seclists.org/fulldisclosure/2013/Dec/199 - | |
References | () http://www.phenoelit.org/stuff/ffcrm.txt - Exploit | |
References | () https://github.com/fatfreecrm/fat_free_crm/commit/93c182dd4c6f3620b721d2a15ba6a6ecab5669df - Exploit, Patch | |
References | () https://github.com/fatfreecrm/fat_free_crm/issues/300 - | |
References | () https://github.com/fatfreecrm/fat_free_crm/wiki/Fixing-security-vulnerabilities-%2827th-Dec-2013%29 - Vendor Advisory |
Information
Published : 2014-01-02 14:59
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7222
Mitre link : CVE-2013-7222
CVE.ORG link : CVE-2013-7222
JSON object : View
Products Affected
fatfreecrm
- fat_free_crm
CWE
CWE-310
Cryptographic Issues