Podatność CVE-2023-31287


Publikacja: 2023-04-27

Opis:
An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
High
Serenity / StartSharp Software File Upload / XSS / User Enumeration / Reusable Tokens
Fabian Densborn
30.05.2023

 Referencje:
https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2

Copyright 2024, cxsecurity.com

 

Back to Top