In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. Due to the use of Passport.js, this could lead to privilege escalation.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/aprendecondedos/dedos-web/pull/1 | Issue Tracking Third Party Advisory | 
| https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune | Exploit Third Party Advisory | 
| https://github.com/aprendecondedos/dedos-web/pull/1 | Issue Tracking Third Party Advisory | 
| https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/aprendecondedos/dedos-web/pull/1 - Issue Tracking, Third Party Advisory | |
| References | () https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune - Exploit, Third Party Advisory | 
Information
                Published : 2018-06-05 15:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10813
Mitre link : CVE-2018-10813
CVE.ORG link : CVE-2018-10813
JSON object : View
Products Affected
                aprendecondedos
- dedos-web
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
