question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Required login bypass vulnerability

See original GitHub issue

Vulnerability Information

  • Version: v3.0-beta-3 or below
  • Type: CWE-284 (Improper Access Control)

Issue Description

Due to missing login check in org.dynmap.servlet.MapStorageResourceHandler.java, attacker can see map image without login despite “login-required” is enabled in configuration.

Reproduce Steps

  1. Enable login-required and login-enabled in configuration.
  2. Try this PoC

Issue Analytics

  • State:closed
  • Created 4 years ago
  • Comments:8 (8 by maintainers)

github_iconTop GitHub Comments

1reaction
mikeprimmcommented, Jun 9, 2019

Just released v3.0-beta-4 on both dev.bukkit.org and spigotmc.org

1reaction
mikeprimmcommented, Jun 6, 2019

It’s all OK - I’ve been fighting to find the time to finish the release, so I might have been feeling a bit rushed 😃

Read more comments on GitHub >

github_iconTop Results From Across the Web

What is an Authentication Bypass Vulnerability? 7 Things to ...
In this guide, we'll discuss what an authentication bypass vulnerability is, and ways to secure your site against it.
Read more >
Authentication Bypass Vulnerability Patched in User ...
This flaw made it possible for unauthenticated attackers to login as any user, including administrative users, on an affected site as long as...
Read more >
Login Bypass - HackTricks
Bypass regular login ; Check for comments inside the page (scroll down and to the right?) ; Check if you can directly access...
Read more >
Using SQL Injection to Bypass Authentication - PortSwigger
In this example we will demonstrate a technique to bypass the authentication of a vulnerable login page using SQL injection. This tutorial uses...
Read more >
Authentication Bypass Vulnerability: What is it and how to stay ...
Organizations failing to enforce strong access policy and authentication controls could allow an attacker to bypass authentication. · Attackers ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found