Cloudera HUE Session cookies stored...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

**User session cookies are stored** in the database. Combined with the vulnerability related to [configuration file which is world readable](../Configuration%20file%20world%20readable/), it is possible to **spoof a user across the entire cluster launching jobs and browsing the datalake**, without having to crack password hashes. Cookies are stored in the `django_session` table: `session_key` is the **cookie** and `session_data` holds the **user id with some other information encoded in base64.** The following example shows how to **find a valid session cookie for a specific user (id=1).** ``` mysql> select * from django_session limit 1 \G ; *************************** 1. row *************************** session_key: m67424cld61xe8960moyjj1esjqfiyvj session_data: NGY2MzJhYjkxM2M5ZTU4ZDk0YjNjNjc4ODI1NmVkMzExMTI3YTc5NDp7Il9hdXRoX3VzZXJfYmFja2VuZCI6ImRlc2t0b3AuYXV0aC5iYWNrZW5kLkFsbG93Rmlyc3RVc2VyRGphbmdvQmFja2VuZCIsIl9hdXRoX3VzZXJfaWQiOjF9 expire_date: 2017-01-03 07:00:07 ``` ``` $ echo...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息