Servisnet Tessa Authentication Bypass

Discussion in 'News Aggregator' started by Packet Storm, 5 Feb 2022.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits an authentication bypass in Servisnet Tessa, triggered by add new sysadmin user. The app.js is publicly available which acts as the backend of the application. By exposing a default value for the "Authorization" HTTP header, it is possible to make unauthenticated requests to some areas of the application. Even MQTT (Message Queuing Telemetry Transport) protocol connection information can be obtained with this method. A new admin user can be added to the database with this header obtained in the source code.

    Continue reading...
     

Share This Page

Loading...