
We found results for “”
CVE-2023-50172
Good to know:

Date: January 10, 2024
A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to the silent creation of a recovery pass code for any user.
Language: PHP
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Weak Password Recovery Mechanism for Forgotten Password
CWE-640Top Fix

Upgrade Version
Upgrade to version wwbn/avideo - dev-dependabot/composer/google/apiclient-services-0.249.0;wwbn/avideo - dev-dependabot/composer/ratchet/pawl-0.4.1;wwbn/avideo - dev-dependabot/composer/google/auth-1.21.0;wwbn/avideo - dev-dependabot/composer/monolog/monolog-2.6.0;wwbn/avideo - dev-dependabot/npm_and_yarn/tinymce-6.5.1;wwbn/avideo - dev-julzxcapz;wwbn/avideo - dev-akhilleusuggo-patch-3;wwbn/avideo - dev-dependabot/composer/abraham/twitteroauth-3.1.0;wwbn/avideo - dev-dependabot/composer/aws/aws-sdk-php-3.300.14;wwbn/avideo - dev-master;wwbn/avideo - 14.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | LOW |
Availability (A): | NONE |