An improper authentication vulnerability can be exploited through a race condition that occurs in Ellucian Banner Web Tailor 8.8.3, 8.8.4, and 8.9 and Banner Enterprise Identity Services 8.3, 8.3.1, 8.3.2, and 8.4, in conjunction with SSO Manager. This vulnerability allows remote attackers to steal a victims session (and cause a denial of service) by repeatedly requesting the initial Banner Web Tailor main page with the IDMSESSID cookie set to the victims UDCID, which in the case tested is the institutional ID. During a login attempt by a victim, the attacker can leverage the race condition and will be issued the SESSID that was meant for this victim.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Banner_enterprise_identity_services | Ellucian | 8.3 (including) | 8.3 (including) |
Banner_enterprise_identity_services | Ellucian | 8.3.1 (including) | 8.3.1 (including) |
Banner_enterprise_identity_services | Ellucian | 8.3.2 (including) | 8.3.2 (including) |
Banner_enterprise_identity_services | Ellucian | 8.4 (including) | 8.4 (including) |
Banner_web_tailor | Ellucian | 8.8.3 (including) | 8.8.3 (including) |
Banner_web_tailor | Ellucian | 8.8.4 (including) | 8.8.4 (including) |
Banner_web_tailor | Ellucian | 8.9 (including) | 8.9 (including) |