Описание
components/com_user/models/reset.php in Joomla! 1.5 through 1.5.5 does not properly validate reset tokens, which allows remote attackers to reset the "first enabled user (lowest id)" password, typically for the administrator.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:joomla:com_user:1.5:*:*:*:*:*:*:*
cpe:2.3:a:joomla:com_user:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:joomla:com_user:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:joomla:com_user:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:joomla:com_user:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:joomla:com_user:1.5.5:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.20835
Средний
7.5 High
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
почти 4 года назад
components/com_user/models/reset.php in Joomla! 1.5 through 1.5.5 does not properly validate reset tokens, which allows remote attackers to reset the "first enabled user (lowest id)" password, typically for the administrator.
EPSS
Процентиль: 95%
0.20835
Средний
7.5 High
CVSS2
Дефекты
CWE-264