CVE-2019-15955
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An issue was discovered in Total.js CMS 12.0.0. A low privilege user can perform a simple transformation of a cookie to obtain the random values inside it. If an attacker can discover a session cookie owned by an admin, then it is possible to brute force it with O(n)=2n instead of O(n)=n^x complexity, and steal the admin password.
Se detectó un problema en Total.js CMS versión 12.0.0. Un usuario con pocos privilegios puede realizar una transformación simple de una cookie para obtener los valores aleatorios dentro de ella. Si un atacante puede descubrir una cookie de sesión propiedad de un administrador, entonces es posible forzarla con una complejidad O(n)=2n instead of O(n)=n^x , y robar la contraseña de administrador.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-09-05 CVE Reserved
- 2019-09-05 CVE Published
- 2023-05-23 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf | 2024-08-05 | |
https://seclists.org/fulldisclosure/2019/Sep/3 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Totaljs Search vendor "Totaljs" | Total.js Cms Search vendor "Totaljs" for product "Total.js Cms" | 12.0.0 Search vendor "Totaljs" for product "Total.js Cms" and version "12.0.0" | - |
Affected
|