// For flags

CVE-2020-8434

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented).

Jenzabar JICS (también se conoce como Internet Campus Solution) versiones anteriores a 9.0.1 Patch 3, versiones 9.1 anteriores a 9.1.2, Patch 2 y versiones 9.2 anteriores a 9.2.2 Patch 8, contiene cookies de sesión que son una función determinística del nombre de usuario. Se presenta una contraseña embebida para suministrar una fuente PBKDF hacia AES para cifrar un nombre de usuario y codificarlo en base64 en una cookie del lado del cliente para una autenticación de sesión persistente. Al conocer la clave y el algoritmo, un atacante puede seleccionar cualquier nombre de usuario, cifrarlo, codificarlo en base64 y guardarlo en su navegador con el formato de cookie JICSLoginCookie correcto para suplantar a cualquier usuario real en la base de datos JICS sin la necesidad de autenticarse (o verificación con MFA si es implementado).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-29 CVE Reserved
  • 2020-05-19 CVE Published
  • 2023-11-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-384: Session Fixation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jenzabar
Search vendor "Jenzabar"
Internet Campus Solution
Search vendor "Jenzabar" for product "Internet Campus Solution"
<= 9.0.1
Search vendor "Jenzabar" for product "Internet Campus Solution" and version " <= 9.0.1"
-
Affected
Jenzabar
Search vendor "Jenzabar"
Internet Campus Solution
Search vendor "Jenzabar" for product "Internet Campus Solution"
>= 9.1.0 <= 9.1.2
Search vendor "Jenzabar" for product "Internet Campus Solution" and version " >= 9.1.0 <= 9.1.2"
-
Affected
Jenzabar
Search vendor "Jenzabar"
Internet Campus Solution
Search vendor "Jenzabar" for product "Internet Campus Solution"
>= 9.2.0 <= 9.2.2
Search vendor "Jenzabar" for product "Internet Campus Solution" and version " >= 9.2.0 <= 9.2.2"
-
Affected