Vulnerability Description
In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of the session cookie and re-sign it using the hardcoded secret. Due to the use of Passport.js, this could lead to privilege escalation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aprendecondedos | Dedos-Web | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/aprendecondedos/dedos-web/pull/1Issue TrackingThird Party Advisory
- https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-TellExploitThird Party Advisory
- https://github.com/aprendecondedos/dedos-web/pull/1Issue TrackingThird Party Advisory
- https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-TellExploitThird Party Advisory
FAQ
What is CVE-2018-10813?
CVE-2018-10813 is a vulnerability with a CVSS score of 7.3 (HIGH). In Dedos-web 1.0, the cookie and session secrets used in the Express.js application have hardcoded values that are visible in the source code published on GitHub. An attacker can edit the contents of ...
How severe is CVE-2018-10813?
CVE-2018-10813 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10813?
Check the references section above for vendor advisories and patch information. Affected products include: Aprendecondedos Dedos-Web.