CVE-2016-0783

The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:openmeetings:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:42

Type Values Removed Values Added
References () http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code - () http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code -
References () http://openmeetings.apache.org/security.html - Patch, Vendor Advisory () http://openmeetings.apache.org/security.html - Patch, Vendor Advisory
References () http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html - () http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html -
References () http://www.securityfocus.com/archive/1/537886/100/0/threaded - () http://www.securityfocus.com/archive/1/537886/100/0/threaded -
References () https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG - () https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG -

Information

Published : 2016-04-11 14:59

Updated : 2024-11-21 02:42


NVD link : CVE-2016-0783

Mitre link : CVE-2016-0783

CVE.ORG link : CVE-2016-0783


JSON object : View

Products Affected

apache

  • openmeetings
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor