A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/magicwave18/vuldb/issues/1 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.240926 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.240926 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Feb 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-29 22:15
Updated : 2024-05-17 02:32
NVD link : CVE-2023-5296
Mitre link : CVE-2023-5296
CVE.ORG link : CVE-2023-5296
JSON object : View
Products Affected
rockoa
- rockoa
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password