An issue was discovered in Open XDMoD through 7.5.0. An authentication bypass (account takeover) exists due to a weak password reset mechanism. A brute-force attack against an MD5 rid value requires only 600 guesses in the plausible situation where the attacker knows that the victim has started a password-reset process (pass_reset.php, password_reset.php, XDUser.php) in the past few minutes.
References
Link | Resource |
---|---|
https://github.com/grymer/CVE/blob/master/CVE-2018-16988.md | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-02T19:38:07
Updated: 2019-05-02T19:38:07
Reserved: 2018-09-13T00:00:00
Link: CVE-2018-16988
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-05-02T20:29:00.617
Modified: 2020-01-02T20:25:50.190
Link: CVE-2018-16988
JSON object: View
Redhat Information
No data.
CWE