CVE-2020-15896
Summary
| CVE | CVE-2020-15896 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-22 19:15:00 UTC |
| Updated | 2020-07-27 15:06:00 UTC |
| Description | An authentication-bypass issue was discovered on D-Link DAP-1522 devices 1.4x before 1.10b04Beta02. There exist a few pages that are directly accessible by any unauthorized user, e.g., logout.php and login.php. This occurs because of checking the value of NO_NEED_AUTH. If the value of NO_NEED_AUTH is 1, the user has direct access to the webpage without any authentication. By appending a query string NO_NEED_AUTH with the value of 1 to any protected URL, any unauthorized user can access the application directly, as demonstrated by bsc_lan.php?NO_NEED_AUTH=1. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Dlink | Dap-1522 | a1 | All | All | All |
| Hardware | Dlink | Dap-1522 | a1 | All | All | All |
| Operating System | Dlink | Dap-1522 Firmware | 1.41 | All | All | All |
| Operating System | Dlink | Dap-1522 Firmware | 1.42 | All | All | All |
| Operating System | Dlink | Dap-1522 Firmware | 1.41 | All | All | All |
| Operating System | Dlink | Dap-1522 Firmware | 1.42 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2020-15896:Authentication Bypass in D-link Firmware DAP-1522 - Loginsoft Research | MISC | research.loginsoft.com | Third Party Advisory |
| D-Link Technical Support | MISC | supportannouncement.us.dlink.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.