Submeter #194675: Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1informação

TítuloAdministrator password reset vulnerability exists in RapidCMS Dev.1.3.1
Descrição[Suggested description] RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`. [Vulnerability Type] Unauthorized Access Vulnerability [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Attack Type] Remote [Vulnerability demonstration] https://github.com/OpenRapid/rapidcms/issues/5 [Cause of vulnerability] In `admin/run-movepass.php`, the developer did not perform user permission authentication on the access to the file, and the attacker could control the values of the `password` and `password2` parameters, thereby unauthorized modification of the administrator password.
Fonte⚠️ https://github.com/OpenRapid/rapidcms/issues/5
Utilizador
 TXPH (UID 50296)
Submissão13/08/2023 10h34 (há 3 anos)
Moderação20/08/2023 09h11 (7 days later)
EstadoAceite
Entrada VulDB237569 [OpenRapid RapidCMS 1.3.1 admin/run-movepass.php password/password2 Elevação de Privilégios]
Pontos20

Interested in the pricing of exploits?

See the underground prices here!