CVE-2020-27422

In Anuko Time Tracker v1.19.23.5311, the password reset link emailed to the user doesn't expire once used, allowing an attacker to use the same link to takeover the account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:anuko:time_tracker:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () https://packetstormsecurity.com/files/160051/Anuko-Time-Tracker-1.19.23.5311-Password-Reset.html - Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/160051/Anuko-Time-Tracker-1.19.23.5311-Password-Reset.html - Third Party Advisory, VDB Entry
References () https://www.anuko.com/time-tracker/index.htm - Product, Vendor Advisory () https://www.anuko.com/time-tracker/index.htm - Product, Vendor Advisory

Information

Published : 2020-11-16 16:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27422

Mitre link : CVE-2020-27422

CVE.ORG link : CVE-2020-27422


JSON object : View

Products Affected

anuko

  • time_tracker
CWE
CWE-613

Insufficient Session Expiration