Отправить #194675: Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1Информация

НазваниеAdministrator password reset vulnerability exists in RapidCMS Dev.1.3.1
Описание[Suggested description] RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`. [Vulnerability Type] Unauthorized Access Vulnerability [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Attack Type] Remote [Vulnerability demonstration] https://github.com/OpenRapid/rapidcms/issues/5 [Cause of vulnerability] In `admin/run-movepass.php`, the developer did not perform user permission authentication on the access to the file, and the attacker could control the values of the `password` and `password2` parameters, thereby unauthorized modification of the administrator password.
Источник⚠️ https://github.com/OpenRapid/rapidcms/issues/5
Пользователь
 TXPH (UID 50296)
Представление13.08.2023 10:34 (3 лет назад)
Модерация20.08.2023 09:11 (7 days later)
Статуспринято
Запись VulDB237569 [OpenRapid RapidCMS 1.3.1 admin/run-movepass.php password/password2 эскалация привилегий]
Баллы20

Interested in the pricing of exploits?

See the underground prices here!