An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://github.com/MISP/MISP/compare/v2.4.157...v2.4.158 | third party advisory release notes |
https://github.com/MISP/MISP/commit/01120163a6b4d905029d416e7305575df31df8af | third party advisory patch |
https://zigrin.com/cakephp-application-cybersecurity-research-the-impact-of-a-php-vulnerability-exploring-the-password-confirmation-bypass-in-misp/ | third party advisory exploit |
https://zigrin.com/advisories/misp-password-confirmation-can-be-bypassed/ | third party advisory |