The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.
A number or object is predictable based on observations that the attacker can make about the state of the system or network, such as time, process ID, etc.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | third party advisory |
https://cert.pl/posts/2024/01/CVE-2023-49253/ | third party advisory |