2025-06-25 07:52
CHT Security Red Team Discovered Vulnerability in Well-Known e-Learning System.
Summary
The Red Team of CHT Security discovered two vulnerabilities in a well-known domestic online learning system, including two authentication bypass weaknesses, affecting domestic enterprises.
Vulnerability List
- An attacker, without logging in, can log in as any user through specific packets. This vulnerability can be classified under CWE-287: Improper Authentication.
- An attacker, without logging in, can access arbitrary APIs through specific parameters. This vulnerability can be classified under CWE-287: Improper Authentication
Details
1. Improper Authentication
Description
A certain login function has an insecure verification method.
Impact
An unauthenticated user can exploit this to forge any user's login and gain access.
Known Affected Software
- Version before 6.8.1039V1144.1045 (including)
Credits
- TsungShu Chiu (CHT Security)
2. Improper Authentication
Description
The mechanism for identity verification in the packet can be compromised by unauthenticated user.
Impact
An attacker can forge any user to access the system, including the APIs.
Known Affected Software
- Version before 6.8.1039V1144.1045 (including)
Credits
- TsungShu Chiu (CHT Security)