MKCMS 5.0 allows remote attackers to take over arbitrary user accounts by posting a username and e-mail address to ucenter/repass.php, which triggers e-mail transmission with the password, as demonstrated by 123456.
References
Link | Resource |
---|---|
https://cisk123456.blogspot.com/2019/04/mkcms-v50.html | Exploit Third Party Advisory |
https://cisk123456.blogspot.com/2019/04/mkcms-v50.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://cisk123456.blogspot.com/2019/04/mkcms-v50.html - Exploit, Third Party Advisory |
Information
Published : 2019-04-18 23:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11332
Mitre link : CVE-2019-11332
CVE.ORG link : CVE-2019-11332
JSON object : View
Products Affected
mkcms_project
- mkcms
CWE