The HTTP Authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier uses the same nonce for all authentication, which allows remote attackers to hijack web sessions or bypass authentication via a replay attack.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/509199/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55977 | vdb entry |
http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication | |
http://secunia.com/advisories/38323 | third party advisory vendor advisory |
http://osvdb.org/62014 | vdb entry |