First published: Thu Feb 06 2020(Updated: )
An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EyesOfNetwork EyesOfNetwork | =5.3-0 | |
=5.3-0 | ||
EyesOfNetwork EyesOfNetwork |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8657 is considered a high-severity vulnerability due to its potential for administrative access exploitation.
To fix CVE-2020-8657, it is recommended to change the hardcoded API key to a unique value for your installation.
The potential impacts of CVE-2020-8657 include unauthorized access to administrative functions, which could lead to further exploitation of the system.
CVE-2020-8657 affects EyesOfNetwork version 5.3-0.
Yes, CVE-2020-8657 is exploitable remotely due to the improper handling of API keys.