Описание
The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.
The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-0783
- https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG
- http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code
- http://openmeetings.apache.org/security.html
- http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html
- http://www.securityfocus.com/archive/1/537886/100/0/threaded
Связанные уязвимости
The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.