CVE-2017-17097

gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php.
References
Link Resource
https://gist.github.com/pak0s/ea7a80c2614d9cd43cfb8230c65c9fec Patch Third Party Advisory
https://s1.gps-server.net/changelog.txt Release Notes Vendor Advisory
https://www.exploit-db.com/exploits/43431/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gps-server:gps_tracking_software:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.2:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.3:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.4:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.5.9:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.6:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.7:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.8:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.9:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.9.5:*:*:*:*:*:*:*
cpe:2.3:a:gps-server:gps_tracking_software:2.9.6:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-01-02 15:29

Updated : 2024-02-04 19:29


NVD link : CVE-2017-17097

Mitre link : CVE-2017-17097

CVE.ORG link : CVE-2017-17097


JSON object : View

Products Affected

gps-server

  • gps_tracking_software
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password