mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-12 17:32:18 +02:00
20 lines
982 B
Markdown
20 lines
982 B
Markdown
### [CVE-2021-29012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29012)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is logged out. In other words, the cookie is functionally equivalent to a static password, and thus provides permanent access if stolen.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/164154/DMA-Softlab-Radius-Manager-4.4.0-Session-Management-Cross-Site-Scripting.html
|
|
- https://github.com/1d8/publications/tree/main/cve-2021-29012
|
|
|
|
#### Github
|
|
- https://github.com/1d8/publications
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
|