class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing.
References
Link | Resource |
---|---|
https://github.com/jra89/CVE-2019-19735 | Exploit Third Party Advisory |
https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 | |
https://github.com/jra89/CVE-2019-19735 | Exploit Third Party Advisory |
https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jra89/CVE-2019-19735 - Exploit, Third Party Advisory | |
References | () https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 - |
07 Nov 2023, 03:07
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-12-30 17:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19735
Mitre link : CVE-2019-19735
CVE.ORG link : CVE-2019-19735
JSON object : View
Products Affected
mfscripts
- yetishare
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort