CVE-2021-27200

In WoWonder 3.0.4, remote attackers can take over any account due to the weak cryptographic algorithm in recover.php. The code parameter is easily predicted from the time of day.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wowonder:wowonder:3.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 05:57

Type Values Removed Values Added
References () https://securityforeveryone.com/blog/wowonder-0-day-vulnerability-cve-2021-27200 - Exploit, Third Party Advisory () https://securityforeveryone.com/blog/wowonder-0-day-vulnerability-cve-2021-27200 - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/49989 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/49989 - Exploit, Third Party Advisory, VDB Entry
References () https://www.wowonder.com - Product () https://www.wowonder.com - Product

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-326 CWE-330

23 Jun 2021, 17:06

Type Values Removed Values Added
CPE cpe:2.3:a:wowonder:wowonder:3.0.4:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-326
References (MISC) https://www.wowonder.com - (MISC) https://www.wowonder.com - Product
References (MISC) https://securityforeveryone.com/blog/wowonder-0-day-vulnerability-cve-2021-27200 - (MISC) https://securityforeveryone.com/blog/wowonder-0-day-vulnerability-cve-2021-27200 - Exploit, Third Party Advisory
References (MISC) https://www.exploit-db.com/exploits/49989 - (MISC) https://www.exploit-db.com/exploits/49989 - Exploit, Third Party Advisory, VDB Entry

11 Jun 2021, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-11 18:15

Updated : 2024-11-21 05:57


NVD link : CVE-2021-27200

Mitre link : CVE-2021-27200

CVE.ORG link : CVE-2021-27200


JSON object : View

Products Affected

wowonder

  • wowonder
CWE
CWE-330

Use of Insufficiently Random Values