Description
An issue was discovered in Object First Ootbi BETA build 1.0.7.712. The authorization service has a flow that allows getting access to the Web UI without knowing credentials. For signing, the JWT token uses a secret key that is generated through a function that doesn't produce cryptographically strong sequences. An attacker can predict these sequences and generate a JWT token. As a result, an attacker can get access to the Web UI. This is fixed in Object First Ootbi BETA build 1.0.13.1611.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-47728 | An issue was discovered in Object First Ootbi BETA build 1.0.7.712. The authorization service has a flow that allows getting access to the Web UI without knowing credentials. For signing, the JWT token uses a secret key that is generated through a function that doesn't produce cryptographically strong sequences. An attacker can predict these sequences and generate a JWT token. As a result, an attacker can get access to the Web UI. This is fixed in Object First Ootbi BETA build 1.0.13.1611. |
References
| Link | Providers |
|---|---|
| https://objectfirst.com/security/of-20221024-0002/ |
|
History
Tue, 24 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Objectfirst ootbi
|
|
| CPEs | cpe:2.3:a:objectfirst:ootbi:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Objectfirst object First
|
Objectfirst ootbi
|
Thu, 01 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-01T17:39:44.437Z
Reserved: 2022-11-07T00:00:00.000Z
Link: CVE-2022-44796
Updated: 2024-08-03T14:01:31.295Z
Status : Analyzed
Published: 2022-11-07T04:15:09.600
Modified: 2025-06-24T17:46:13.160
Link: CVE-2022-44796
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD