Consona Password Reset Security Bypass

Risk: Medium
Local: Yes
Remote: No
CWE: CWE-287

CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Hi!! 8 years ago, I discovered this vulnerability, CVE-2010-1910, and now, you can see the details. The login page, "/sdcxuser/asp/login.asp", had a commented access to the page that allowed to change the password of any user, with a link with text "Forgot your password". The link that had the vulnerability was: "/adccommonn/asp/forgotpass.asp". You could enter any username and password without being authenticated and change it, administrator or any other user. <!-- # Exploit Title: Multiple Consona Products Password Reset Security Bypass Vulnerability # Date: 22-03-2010 # Exploit Author: Rafael Pedrero # Vendor Homepage: # Software Link: # Version: Consona Consona Subscriber Assistance, Consona Consona Live Assistance, Consona Consona Dynamic Agent # Tested on: all # CVE : CVE-2010-1910 # Category: webapps 1. Description The Forgot Password implementation in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to reset passwords of accounts with blank Hint questions and Hint answers by sending an empty value for each of these two Hint fields. 2. Proof of Concept http://X.X.X.X/adccommonn/asp/forgotpass.asp Enter any username and password without being authenticated and change it, it's not necessary to know the current one since it's not used. 3. Solution: The vendor has released updates. See -->

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018,


Back to Top