Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.
References
Link | Resource |
---|---|
https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html | Broken Link Third Party Advisory |
https://gestsup.fr/index.php?page=download | Patch Vendor Advisory |
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-04-26T18:07:19
Updated: 2021-04-26T18:07:19
Reserved: 2021-04-23T00:00:00
Link: CVE-2021-31646
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-26T19:15:08.550
Modified: 2021-05-04T00:32:57.907
Link: CVE-2021-31646
JSON object: View
Redhat Information
No data.
CWE