RSS   Podatności dla 'Mk-auth'   RSS

2021-01-04
 
CVE-2021-21495

CWE-352
 

 
MK-AUTH through 19.01 K4.9 allows CSRF for password changes via the central/executar_central.php?acao=altsenha_princ URI.

 
 
CVE-2021-21494

CWE-79
 

 
MK-AUTH through 19.01 K4.9 allows XSS via the admin/logs_ajax.php tipo parameter. An attacker can leverage this to read the centralmka2 (session token) cookie, which is not set to HTTPOnly.

 
2021-01-03
 
CVE-2021-3005

NVD-CWE-noinfo
 

 
MK-AUTH through 19.01 K4.9 allows remote attackers to obtain sensitive information (e.g., a CPF number) via a modified titulo (aka invoice number) value to the central/recibo.php URI.

 
2020-06-29
 
CVE-2020-14072

NVD-CWE-noinfo
 

 
An issue was discovered in MK-AUTH 19.01. It allows command execution as root via shell metacharacters to /auth admin scripts.

 
 
CVE-2020-14071

CWE-79
 

 
An issue was discovered in MK-AUTH 19.01. XSS vulnerabilities in admin and client scripts allow an attacker to execute arbitrary JavaScript code.

 
 
CVE-2020-14070

CWE-798
 

 
An issue was discovered in MK-AUTH 19.01. There is authentication bypass in the web login functionality because guessable credentials to admin/executar_login.php result in admin access.

 
 
CVE-2020-14069

CWE-89
 

 
An issue was discovered in MK-AUTH 19.01. There are SQL injection issues in mkt/ PHP scripts, as demonstrated by arp.php, dhcp.php, hotspot.php, ip.php, pgaviso.php, pgcorte.php, pppoe.php, queues.php, and wifi.php.

 
 
CVE-2020-14068

CWE-287
 

 
An issue was discovered in MK-AUTH 19.01. The web login functionality allows an attacker to bypass authentication and gain client privileges via SQL injection in central/executar_login.php.

 


Copyright 2024, cxsecurity.com

 

Back to Top