An improper authentication vulnerability can be exploited through a race condition that occurs in Ellucian Banner Web Tailor 8.8.3, 8.8.4, and 8.9 and Banner Enterprise Identity Services 8.3, 8.3.1, 8.3.2, and 8.4, in conjunction with SSO Manager. This vulnerability allows remote attackers to steal a victim's session (and cause a denial of service) by repeatedly requesting the initial Banner Web Tailor main page with the IDMSESSID cookie set to the victim's UDCID, which in the case tested is the institutional ID. During a login attempt by a victim, the attacker can leverage the race condition and will be issued the SESSID that was meant for this victim.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152856/Ellucian-Banner-Web-Tailor-Banner-Enterprise-Identity-Services-Improper-Authentication.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/May/18 | Mailing List Third Party Advisory |
https://ecommunities.ellucian.com/message/252749#252749 | Permissions Required |
https://ecommunities.ellucian.com/message/252810#252810 | Permissions Required |
https://raw.githubusercontent.com/JoshuaMulliken/CVE-2019-8978/master/README.txt | Third Party Advisory |
https://seclists.org/bugtraq/2019/May/31 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-05-14 19:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-8978
Mitre link : CVE-2019-8978
CVE.ORG link : CVE-2019-8978
JSON object : View
Products Affected
ellucian
- banner_web_tailor
- banner_enterprise_identity_services