CVE-2021-44151
Reprise License Manager 14.2 Session Hijacking
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any existing sessions by bruteforcing the 4 hex-character session cookie on the Windows version (the Linux version appears to have 8 characters). An attacker can obtain the static part of the cookie (cookie name) by first making a request to any page on the application (e.g., /goforms/menu) and saving the name of the cookie sent with the response. The attacker can then use the name of the cookie and try to request that same page, setting a random value for the cookie. If any user has an active session, the page should return with the authorized content, when a valid cookie value is hit.
Se ha detectado un problema en Reprise RLM versión 14.2. Como las cookies de sesión son pequeñas, un atacante puede secuestrar cualquier sesión presente forzando la cookie de sesión de 4 caracteres hexadecimales en la versión de Windows (la versión de Linux parece tener 8 caracteres). Un atacante puede obtener la parte estática de la cookie (nombre de la cookie) al hacer primero una petición a cualquier página de la aplicación (por ejemplo, /goforms/menú) y guardando el nombre de la cookie enviada con la respuesta. El atacante puede entonces usar el nombre de la cookie e intentar solicitar esa misma página, estableciendo un valor aleatorio para la cookie. Si algún usuario presenta una sesión activa, la página debería volver con el contenido autorizado, cuando se encuentre un valor de cookie válido
Reprise License Manager version 14.2 suffers from an unauthenticated session hijacking vulnerability via brute forcing. The vendor has contacted Packet Storm to note that in v15.1 they fixed this issue by updating the session cookie size to 40 bytes, from the previous 4 bytes on Windows and 8 bytes on Linux.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-22 CVE Reserved
- 2021-12-08 CVE Published
- 2024-08-04 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/165191/Reprise-License-Manager-14.2-Session-Hijacking.html | Third Party Advisory | |
https://www.reprisesoftware.com/RELEASE_NOTES |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://reprisesoftware.com/admin/rlm-admin-download.php?&euagree=yes | 2023-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Reprisesoftware Search vendor "Reprisesoftware" | Reprise License Manager Search vendor "Reprisesoftware" for product "Reprise License Manager" | 14.2 Search vendor "Reprisesoftware" for product "Reprise License Manager" and version "14.2" | - |
Affected
|