First published: Tue May 19 2020(Updated: )
Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenzabar Internet Campus Solution | <=9.0.1 | |
Jenzabar Internet Campus Solution | >=9.1.0<=9.1.2 | |
Jenzabar Internet Campus Solution | >=9.2.0<=9.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8434 is a vulnerability in Jenzabar JICS (Internet Campus Solution) before version 9.0.1 Patch 3, 9.1 before version 9.1.2 Patch 2, and 9.2 before version 9.2.2 Patch 8 that allows for authentication bypass and login with any account.
CVE-2020-8434 has a severity rating of 9.8 (Critical).
CVE-2020-8434 affects Jenzabar JICS versions before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 by allowing authentication bypass and login with any account.
Yes, users should upgrade to Jenzabar JICS version 9.0.1 Patch 3, 9.1 version 9.1.2 Patch 2, or 9.2 version 9.2.2 Patch 8 to fix CVE-2020-8434.
More information about CVE-2020-8434 can be found at the following reference: [link](https://medium.com/@mdavis332/higher-ed-erp-portal-vulnerability-auth-bypass-to-login-any-account-f1aeef438f80)