CVE-2024-7659

A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*

History

15 Aug 2024, 17:49

Type Values Removed Values Added
First Time Projectsend projectsend
Projectsend
CVSS v2 : 2.6
v3 : 3.7
v2 : 2.6
v3 : 7.5
CPE cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
References () https://github.com/projectsend/projectsend/commit/aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17 - () https://github.com/projectsend/projectsend/commit/aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17 - Patch
References () https://github.com/projectsend/projectsend/releases/tag/r1720 - () https://github.com/projectsend/projectsend/releases/tag/r1720 - Release Notes
References () https://vuldb.com/?ctiid.274116 - () https://vuldb.com/?ctiid.274116 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.274116 - () https://vuldb.com/?id.274116 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.385004 - () https://vuldb.com/?submit.385004 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad fue encontrada en proyectos hasta r1605 y clasificada como problemática. La función generate_random_string del archivo include/functions.php del componente Password Reset Token Handler es afectada por esta vulnerabilidad. La manipulación conduce a valores insuficientemente aleatorios. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es difícil. La actualización a la versión r1720 puede solucionar este problema. El nombre del parche es aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. Se recomienda actualizar el componente afectado.

12 Aug 2024, 13:41

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 13:38

Updated : 2024-08-15 17:49


NVD link : CVE-2024-7659

Mitre link : CVE-2024-7659

CVE.ORG link : CVE-2024-7659


JSON object : View

Products Affected

projectsend

  • projectsend
CWE
CWE-330

Use of Insufficiently Random Values