An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Jan/32 | Broken Link Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2021/Jan/43 | Broken Link Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/01/07/1 | Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/01/08/1 | Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2021/01/13/1 | Exploit Mailing List Third Party Advisory |
https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt | Exploit Third Party Advisory |
https://trovent.io/security-advisory-2010-01 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-08 18:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-28208
Mitre link : CVE-2020-28208
CVE.ORG link : CVE-2020-28208
JSON object : View
Products Affected
rocket.chat
- rocket.chat
CWE
CWE-203
Observable Discrepancy