Consona Password Reset Security Bypass

2018.11.26
Risk: Medium
Local: Yes
Remote: No
CWE: CWE-287


CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Hi!! 8 years ago, I discovered this vulnerability, CVE-2010-1910, and now, you can see the details. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1910 The login page, "/sdcxuser/asp/login.asp", had a commented access to the page that allowed to change the password of any user, with a link with text "Forgot your password". The link that had the vulnerability was: "/adccommonn/asp/forgotpass.asp". You could enter any username and password without being authenticated and change it, administrator or any other user. <!-- # Exploit Title: Multiple Consona Products Password Reset Security Bypass Vulnerability # Date: 22-03-2010 # Exploit Author: Rafael Pedrero # Vendor Homepage: http://www.consona.com/ # Software Link: http://www.consona.com/ # Version: Consona Consona Subscriber Assistance, Consona Consona Live Assistance, Consona Consona Dynamic Agent # Tested on: all # CVE : CVE-2010-1910 # Category: webapps 1. Description The Forgot Password implementation in Consona Live Assistance, Dynamic Agent, and Subscriber Assistance allows remote attackers to reset passwords of accounts with blank Hint questions and Hint answers by sending an empty value for each of these two Hint fields. 2. Proof of Concept http://X.X.X.X/adccommonn/asp/forgotpass.asp Enter any username and password without being authenticated and change it, it's not necessary to know the current one since it's not used. 3. Solution: The vendor has released updates. See http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf -->


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top