Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g32f-cm3q-jcmh

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.

In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.

EPSS

Процентиль: 11%
0.00038
Низкий

Дефекты

CWE-640

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.

EPSS

Процентиль: 11%
0.00038
Низкий

Дефекты

CWE-640