Authentication Bypass by Capture-replay in GitHub repository answerdev/answer prior to 1.0.6.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af | patch |
https://huntr.dev/bounties/171cde18-a447-446c-a9ab-297953ad9b86 | third party advisory exploit |