CVE-2017-18486

HIGH

Jitbit Helpdesk <9.0.3 - Privilege Escalation

Title source: llm
STIX 2.1

Description

Jitbit Helpdesk before 9.0.3 allows remote attackers to escalate privileges because of mishandling of the User/AutoLogin userHash parameter. By inspecting the token value provided in a password reset link, a user can leverage a weak PRNG to recover the shared secret used by the server for remote authentication. The shared secret can be used to escalate privileges by forging new tokens for any user. These tokens can be used to automatically log in as the affected user.

Exploits (2)

exploitdb WRITEUP
by Kc57 · textwebappsasp
https://www.exploit-db.com/exploits/42776
nomisec WORKING POC 3 stars
by Kc57 · poc
https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass

References (4)

Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/exploits/42776

Scores

CVSS v3 7.2
EPSS 0.0159
EPSS Percentile 81.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-332
Status published
Products (1)
jitbit/helpdesk < 9.0.3
Published Aug 09, 2019
Tracked Since Feb 18, 2026