An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-02-06T17:48:08
Updated: 2024-08-04T10:03:46.295Z
Reserved: 2020-02-06T00:00:00
Link: CVE-2020-8657
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-02-06T18:15:13.963
Modified: 2024-11-21T05:39:12.627
Link: CVE-2020-8657
Redhat
No data.