Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:MISC:NTOP-NG-AUTH-BY

Severity

Minor

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Ntop-NG CVE-2018-12520 Authentication Bypass

Release Date

2020/01/09

Update Number

3242

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Ntop-NG CVE-2018-12520 Authentication Bypass


This signature detects attempts to exploit a known vulnerability against Ntop-NG. A successful attack can lead to arbitrary code execution.

Extended Description

An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host running the service and the username of the user whose session they're targeting can abuse the deterministic random number generation in order to hijack the user's session, thus escalating their access.

Affected Products

  • Ntop ntopng 3.4

References

  • CVE: CVE-2018-12520

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out