Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass authentication by leveraging a non-empty #wechat#common_member_wechatmp to gain login access to an account via a plugin.php ac=wxregister request (the attacker does not have control over which account will be accessed).
References
Link | Resource |
---|---|
https://gitee.com/ComsenzDiscuz/DiscuzX/issues/IPRUI | Issue Tracking Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-12-24T04:00:00
Updated: 2018-12-24T04:57:01
Reserved: 2018-12-23T00:00:00
Link: CVE-2018-20422
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-12-24T04:29:00.307
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-20422
JSON object: View
Redhat Information
No data.
CWE