Mida eFramework through 2.9.0 has a back door that permits a change of the administrative password and access to restricted functionalities, such as Code Execution.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html | third party advisory exploit |
http://packetstormsecurity.com/files/159239/Mida-eFramework-2.9.0-Backdoor-Access.html | third party advisory vdb entry exploit |