Vulnerability Description
Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jitbit | Helpdesk | < 9.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/Kc57/JitBit_Helpdesk_Auth_BypassExploitThird Party Advisory
- https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-AuthenThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/42776ExploitThird Party AdvisoryVDB Entry
- https://www.trustedsec.com/2017/09/full-disclosure-jitbit-helpdesk-authenticatioThird Party Advisory
- https://github.com/Kc57/JitBit_Helpdesk_Auth_BypassExploitThird Party Advisory
- https://packetstormsecurity.com/files/144334/JitBit-Helpdesk-9.0.2-Broken-AuthenThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/42776ExploitThird Party AdvisoryVDB Entry
- https://www.trustedsec.com/2017/09/full-disclosure-jitbit-helpdesk-authenticatioThird Party Advisory
FAQ
What is CVE-2017-18486?
CVE-2017-18486 is a vulnerability with a CVSS score of 7.2 (HIGH). Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset ...
How severe is CVE-2017-18486?
CVE-2017-18486 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-18486?
Check the references section above for vendor advisories and patch information. Affected products include: Jitbit Helpdesk.