Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.
References
Link | Resource |
---|---|
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch | Patch Vendor Advisory |
https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html | Broken Link Third Party Advisory |
https://gestsup.fr/index.php?page=download | Patch Vendor Advisory |
Configurations
Information
Published : 2021-04-26 12:15
Updated : 2021-05-03 17:32
NVD link : CVE-2021-31646
Mitre link : CVE-2021-31646
JSON object : View
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
Products Affected
gestsup
- gestsup