Discover how CVE-2019-13337 in WESEEK GROWI version 3.5.0 allowed unauthorized access by bypassing basic authentication. Learn about the impact, affected systems, exploitation, and mitigation steps.
WESEEK GROWI version 3.5.0 had a security vulnerability allowing bypass of site-wide basic authentication by adding an access_token as a URL parameter.
Understanding CVE-2019-13337
What is CVE-2019-13337?
In WESEEK GROWI before version 3.5.0, a security flaw existed where basic authentication could be circumvented by inserting an access_token as a URL parameter.
The Impact of CVE-2019-13337
The vulnerability enabled unauthorized access to the website without the need for valid basic authentication credentials.
Technical Details of CVE-2019-13337
Vulnerability Description
The flaw in WESEEK GROWI allowed the bypass of site-wide basic authentication by utilizing an access_token URL parameter.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability could be exploited by adding an access_token as a URL parameter, which was not validated by the backend, thus allowing unauthorized access.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply security patches and updates provided by the software vendor to mitigate the vulnerability.