Soumettre #194675: Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1information

TitreAdministrator password reset vulnerability exists in RapidCMS Dev.1.3.1
Description[Suggested description] RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`. [Vulnerability Type] Unauthorized Access Vulnerability [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Attack Type] Remote [Vulnerability demonstration] https://github.com/OpenRapid/rapidcms/issues/5 [Cause of vulnerability] In `admin/run-movepass.php`, the developer did not perform user permission authentication on the access to the file, and the attacker could control the values of the `password` and `password2` parameters, thereby unauthorized modification of the administrator password.
La source⚠️ https://github.com/OpenRapid/rapidcms/issues/5
Utilisateur
 TXPH (UID 50296)
Soumission13/08/2023 10:34 (il y a 3 ans)
Modérer20/08/2023 09:11 (7 days later)
StatutAccepté
Entrée VulDB237569 [OpenRapid RapidCMS 1.3.1 admin/run-movepass.php password/password2 élévation de privilèges]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!