提出 #194675: Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1情報

タイトルAdministrator password reset vulnerability exists in RapidCMS Dev.1.3.1
説明[Suggested description] RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`. [Vulnerability Type] Unauthorized Access Vulnerability [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Attack Type] Remote [Vulnerability demonstration] https://github.com/OpenRapid/rapidcms/issues/5 [Cause of vulnerability] In `admin/run-movepass.php`, the developer did not perform user permission authentication on the access to the file, and the attacker could control the values of the `password` and `password2` parameters, thereby unauthorized modification of the administrator password.
ソース⚠️ https://github.com/OpenRapid/rapidcms/issues/5
ユーザー
 TXPH (UID 50296)
送信2023年08月13日 10:34 (3 年 ago)
モデレーション2023年08月20日 09:11 (7 days later)
ステータス承諾済み
VulDBエントリ237569 [OpenRapid RapidCMS 1.3.1 admin/run-movepass.php password/password2 特権昇格]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!