CVE-2018-0696

OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors.
References
Link Resource
http://jvn.jp/en/jp/JVN49995005/index.html Third Party Advisory
https://www.cs.themistruct.com/report/wam20181012 Permissions Required Third Party Advisory
https://www.osstech.co.jp/support/am2018-4-1-en Third Party Advisory
http://jvn.jp/en/jp/JVN49995005/index.html Third Party Advisory
https://www.cs.themistruct.com/report/wam20181012 Permissions Required Third Party Advisory
https://www.osstech.co.jp/support/am2018-4-1-en Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:osstech:openam:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:38

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN49995005/index.html - Third Party Advisory () http://jvn.jp/en/jp/JVN49995005/index.html - Third Party Advisory
References () https://www.cs.themistruct.com/report/wam20181012 - Permissions Required, Third Party Advisory () https://www.cs.themistruct.com/report/wam20181012 - Permissions Required, Third Party Advisory
References () https://www.osstech.co.jp/support/am2018-4-1-en - Third Party Advisory () https://www.osstech.co.jp/support/am2018-4-1-en - Third Party Advisory

Information

Published : 2019-02-13 18:29

Updated : 2024-11-21 03:38


NVD link : CVE-2018-0696

Mitre link : CVE-2018-0696

CVE.ORG link : CVE-2018-0696


JSON object : View

Products Affected

osstech

  • openam
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password