Vulnerability Description
In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rukovoditel | Rukovoditel | 2.5.2 |
Related Weaknesses (CWE)
References
- https://fatihhcelik.blogspot.com/2020/01/rukovoditel-password-hash-in-cookie-urlExploitVendor Advisory
- https://fatihhcelik.blogspot.com/2020/01/rukovoditel-password-hash-in-cookie-urlExploitVendor Advisory
FAQ
What is CVE-2020-11821?
CVE-2020-11821 is a vulnerability with a CVSS score of 5.3 (MEDIUM). In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.
How severe is CVE-2020-11821?
CVE-2020-11821 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11821?
Check the references section above for vendor advisories and patch information. Affected products include: Rukovoditel Rukovoditel.