Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-7245

Опубликовано: 23 янв. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 6.8
EPSS Низкий

Описание

Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:ctfd:ctfd:*:*:*:*:*:*:*:*
Версия от 2.0.0 (включая) до 2.2.2 (включая)

EPSS

Процентиль: 59%
0.00383
Низкий

9.8 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-640

Связанные уязвимости

github
больше 3 лет назад

Incorrect username validation in the registration processes of CTFd through 2.2.2 allows a remote attacker to take over an arbitrary account after initiating a password reset. This is related to register() and reset_password() in auth.py. To exploit the vulnerability, one must register with a username similar to the admin, but with spaces inserted before and after the username. This will register the account with the same username as the admin. After a reset of the password for this new account, CTFd will reset the admin account's password due to the username collision.

EPSS

Процентиль: 59%
0.00383
Низкий

9.8 Critical

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-640