CVE-2020-10102

An issue was discovered in Zammad 3.0 through 3.2. The Forgot Password functionality is implemented in a way that would enable an anonymous user to guess valid user emails. In the current implementation, the application responds differently depending on whether the input supplied was recognized as associated with a valid user. This behavior could be used as part of a two-stage automated attack. During the first stage, an attacker would iterate through a list of account names to determine which correspond to valid accounts. During the second stage, the attacker would use a list of common passwords to attempt to brute force credentials for accounts that were recognized by the system in the first stage.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:54

Type Values Removed Values Added
References () https://zammad.com/news/security-advisory-zaa-2020-07 - Patch, Vendor Advisory () https://zammad.com/news/security-advisory-zaa-2020-07 - Patch, Vendor Advisory

Information

Published : 2020-03-05 01:15

Updated : 2024-11-21 04:54


NVD link : CVE-2020-10102

Mitre link : CVE-2020-10102

CVE.ORG link : CVE-2020-10102


JSON object : View

Products Affected

zammad

  • zammad
CWE
CWE-203

Observable Discrepancy