| عنوان | Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1 |
|---|
| الوصف | [Suggested description]
RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`.
[Vulnerability Type]
Unauthorized Access Vulnerability
[Vendor of Product]
https://github.com/OpenRapid/rapidcms
[Affected Product Code Base]
RapidCMS Dev.1.3.1
[Attack Type]
Remote
[Vulnerability demonstration]
https://github.com/OpenRapid/rapidcms/issues/5
[Cause of vulnerability]
In `admin/run-movepass.php`, the developer did not perform user permission authentication on the access to the file, and the attacker could control the values of the `password` and `password2` parameters, thereby unauthorized modification of the administrator password. |
|---|
| المصدر | ⚠️ https://github.com/OpenRapid/rapidcms/issues/5 |
|---|
| المستخدم | TXPH (UID 50296) |
|---|
| ارسال | 13/08/2023 10:34 AM (3 سنوات منذ) |
|---|
| الاعتدال | 20/08/2023 09:11 AM (7 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 237569 [OpenRapid RapidCMS 1.3.1 admin/run-movepass.php password/password2 تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|