Стани премиум член, добиј куп бенефити и поддржи ја работата на IT.mk!
  • Важно
    Имате проблем со најава или регистрација на it.mk?
    Побарајте го решението на вашиот проблем ТУКА!

Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking

zeroscience

ZSL Bot v4.89.1.00
31 мај 2010
891
550
www.zeroscience.mk
Код:
Sielco Radio Link 2.06 'id' Cookie Brute Force Session Hijacking


Vendor: Sielco S.r.l
Product web page: https://www.sielco.org
Affected version: 2.06 (RTX19)
                  2.05 (RTX19)
                  2.00 (EXC19)
                  1.60 (RTX19)
                  1.59 (RTX19)
                  1.55 (EXC19)

Summary: Sielco develops and produces radio links for all
transmission and reception needs, thanks to innovative units
and excellent performances, accompanied by a high reliability
and low consumption.

Desc: The Cookie session ID 'id' is of an insufficient length and
can be exploited by brute force, which may allow a remote attacker
to obtain a valid session, bypass authentication and manipulate
the transmitter.

Tested on: lwIP/2.1.1
           Web/2.9.3


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2023-5762
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5762.php


26.01.2023

--


# Session values (len=5)

Cookie: id=42331
Cookie: id=28903
Cookie: id=+5581
Cookie: id=+9002
...
...


 

Нови мислења

Последни Теми

Статистика

Теми
45.659
Мислења
946.770
Членови
34.137
Огласи
2.006
Најнов член
Drakula
На врв Дно