Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m6q2-xqp2-xxxv

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

register.php for WoltLab Burning Board (wbboard) 1.1.1 uses a small number of random values for the "code" parameter that is provided to action.php to approve a new registration, along with predictable new user ID's, which allows remote attackers to hijack new user accounts via a brute force attack on the new user ID and the code value.

register.php for WoltLab Burning Board (wbboard) 1.1.1 uses a small number of random values for the "code" parameter that is provided to action.php to approve a new registration, along with predictable new user ID's, which allows remote attackers to hijack new user accounts via a brute force attack on the new user ID and the code value.

EPSS

Процентиль: 74%
0.00861
Низкий

Связанные уязвимости

nvd
почти 23 года назад

register.php for WoltLab Burning Board (wbboard) 1.1.1 uses a small number of random values for the "code" parameter that is provided to action.php to approve a new registration, along with predictable new user ID's, which allows remote attackers to hijack new user accounts via a brute force attack on the new user ID and the code value.

EPSS

Процентиль: 74%
0.00861
Низкий