OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN49995005/index.html | Third Party Advisory |
https://www.cs.themistruct.com/report/wam20181012 | Permissions Required Third Party Advisory |
https://www.osstech.co.jp/support/am2018-4-1-en | Third Party Advisory |
http://jvn.jp/en/jp/JVN49995005/index.html | Third Party Advisory |
https://www.cs.themistruct.com/report/wam20181012 | Permissions Required Third Party Advisory |
https://www.osstech.co.jp/support/am2018-4-1-en | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN49995005/index.html - Third Party Advisory | |
References | () https://www.cs.themistruct.com/report/wam20181012 - Permissions Required, Third Party Advisory | |
References | () https://www.osstech.co.jp/support/am2018-4-1-en - Third Party Advisory |
Information
Published : 2019-02-13 18:29
Updated : 2024-11-21 03:38
NVD link : CVE-2018-0696
Mitre link : CVE-2018-0696
CVE.ORG link : CVE-2018-0696
JSON object : View
Products Affected
osstech
- openam
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password