Lucene search

K
seebugwww.seebug.orgSSV:92361
HistoryAug 30, 2016 - 12:00 a.m.

WebNMS Framework 5.2SP1 Login Bypass

2016-08-3000:00:00
www.seebug.org
33

0.952 High

EPSS

Percentile

99.3%

Summary

WebNMS is an industry-leading used to build network management applications architecture. By submitting a custom headers parameter can directly obtain the session Cookie, skip login authentication.

Vulnerability details

Submit the following Get request HTTP header, add a UserName specify a user name, returns the JSESSIONID Cookie can be directly used for session authentication.

GET /servlets/GetChallengeServlet HTTP/1.1 UserName: root

Download the official Windows trial version software testing by: http://www.webnms.com/webnms/14107380/WebNMS_Framework_5_STD_Windows.exe

Other information

  • Vulnerability discovered by: Pedro Ribeiro
  • CVE number: CVE-2016-6603
  • Affect version:<= 5. 2SP1

0.952 High

EPSS

Percentile

99.3%