AGTC MyShop 3.2b allows remote attackers to bypass authentication and obtain administrative access setting the log_accept cookie to "correcto."
Threat-Mapped Scoring
Score: 0.0
Priority: Unclassified
EPSS
Score: 0.02782
Percentile:
0.8546
CVSS Scoring
CVSS v2 Score: 7.5
Severity:
Mapped CWE(s)
-
CWE-287
: Improper Authentication
All CAPEC(s)
-
CAPEC-114: Authentication Abuse
-
CAPEC-115: Authentication Bypass
-
CAPEC-151: Identity Spoofing
-
CAPEC-194: Fake the Source of Data
-
CAPEC-22: Exploiting Trust in Client
-
CAPEC-57: Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
-
CAPEC-593: Session Hijacking
-
CAPEC-633: Token Impersonation
-
CAPEC-650: Upload a Web Shell to a Web Server
-
CAPEC-94: Adversary in the Middle (AiTM)
CAPEC(s) with Mapped TTPs
-
CAPEC-114: Authentication Abuse
Mapped TTPs:
-
T1548
: Abuse Elevation Control Mechanism
-
CAPEC-115: Authentication Bypass
Mapped TTPs:
-
T1548
: Abuse Elevation Control Mechanism
-
CAPEC-57: Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
Mapped TTPs:
-
CAPEC-593: Session Hijacking
Mapped TTPs:
-
T1185
: Browser Session Hijacking
-
T1550.001
: Application Access Token
-
T1563
: Remote Service Session Hijacking
-
CAPEC-633: Token Impersonation
Mapped TTPs:
-
T1134
: Access Token Manipulation
-
CAPEC-650: Upload a Web Shell to a Web Server
Mapped TTPs:
-
CAPEC-94: Adversary in the Middle (AiTM)
Mapped TTPs:
-
T1557
: Adversary-in-the-Middle
Mapped ATT&CK TTPs
-
T1548
: Abuse Elevation Control Mechanism
Kill Chain: privilege-escalation
-
T1548
: Abuse Elevation Control Mechanism
Kill Chain: privilege-escalation
-
T1040
: Network Sniffing
Kill Chain: credential-access
-
T1185
: Browser Session Hijacking
Kill Chain: collection
-
T1550.001
: Application Access Token
Kill Chain: defense-evasion
-
T1563
: Remote Service Session Hijacking
Kill Chain: lateral-movement
-
T1134
: Access Token Manipulation
Kill Chain: defense-evasion
-
T1505.003
: Web Shell
Kill Chain: persistence
-
T1557
: Adversary-in-the-Middle
Kill Chain: credential-access
Malware
APTs Threat Group Associations
Campaigns
- Operation Wocao
- APT41 DUST
- ArcaneDoor
- SolarWinds Compromise
- Operation CuckooBees
- 2015 Ukraine Electric Power Attack
- Versa Director Zero Day Exploitation
- Leviathan Australian Intrusions
- C0032
- HomeLand Justice
- C0017
- Cutting Edge
- 2022 Ukraine Electric Power Attack
- FrostyGoop Incident
Affected Products
- cpe:2.3:a:agtc:agtc_myshop:3.2b:*:*:*:*:*:*:*
← Back to Home