CVE-2021-29012

DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is logged out. In other words, the cookie is functionally equivalent to a static password, and thus provides permanent access if stolen.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dmasoftlab:dma_radius_manager:4.4.0:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-565 CWE-287

16 Sep 2021, 16:00

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html - (MISC) http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry

14 Sep 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html -

Information

Published : 2021-04-02 13:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-29012

Mitre link : CVE-2021-29012

CVE.ORG link : CVE-2021-29012


JSON object : View

Products Affected

dmasoftlab

  • dma_radius_manager
CWE
CWE-287

Improper Authentication