Vulnerability: Weak Authentication Cookie Generation Algorithm

Vulnerability: Weak Authentication Cookie Generation Algorithm

CVE-2023-49259 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.

Learn more about our User Device Pen Test.