member.php in Crossday Discuz! Board allows remote attackers to reset passwords of arbitrary users via crafted (1) lostpasswd and (2) getpasswd actions, possibly involving predictable generation of the id parameter.
References
Configurations
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/32731 - Vendor Advisory | |
References | () http://www.80vul.com/dzvul/sodb/14/dz-exp-sodb-2008-14_php.htm - Exploit | |
References | () http://www.discuz.net/archiver/?tid-1112426.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/32424 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46785 - | |
References | () https://www.exploit-db.com/exploits/7185 - |
Information
Published : 2009-08-12 10:30
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6957
Mitre link : CVE-2008-6957
CVE.ORG link : CVE-2008-6957
JSON object : View
Products Affected
discuz
- discuz\!
CWE
CWE-264
Permissions, Privileges, and Access Controls