Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.
References
Link | Resource |
---|---|
https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html | Broken Link Third Party Advisory |
https://gestsup.fr/index.php?page=download | Patch Vendor Advisory |
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-04-26 19:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-31646
Mitre link : CVE-2021-31646
CVE.ORG link : CVE-2021-31646
JSON object : View
Products Affected
gestsup
- gestsup
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts