An issue was discovered in OXID eShop Enterprise Edition before 5.3.8, 6.0.x before 6.0.3, and 6.1.x before 6.1.0; Professional Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1.0; and Community Edition before 4.10.8, 5.x and 6.0.x before 6.0.3, and 6.1.x before 6.1.0. An attacker could gain access to the admin panel or a customer account when using the password reset function. To do so, it is required to own a domain name similar to the one the victim uses for their e-mail accounts.
References
Link | Resource |
---|---|
https://bugs.oxid-esales.com/view.php?id=6818 | Vendor Advisory |
https://oxidforge.org/en/security-bulletin-2018-002.html | Patch Third Party Advisory |
https://bugs.oxid-esales.com/view.php?id=6818 | Vendor Advisory |
https://oxidforge.org/en/security-bulletin-2018-002.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.oxid-esales.com/view.php?id=6818 - Vendor Advisory | |
References | () https://oxidforge.org/en/security-bulletin-2018-002.html - Patch, Third Party Advisory |
Information
Published : 2018-08-20 22:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12579
Mitre link : CVE-2018-12579
CVE.ORG link : CVE-2018-12579
JSON object : View
Products Affected
oxid-esales
- eshop
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password