An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
References
Configurations
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/160845/Rocket.Chat-3.7.1-Email-Address-Enumeration.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2021/Jan/32 - Broken Link, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Jan/43 - Broken Link, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/01/07/1 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/01/08/1 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/01/13/1 - Exploit, Mailing List, Third Party Advisory | |
References | () https://trovent.github.io/security-advisories/TRSA-2010-01/TRSA-2010-01.txt - Exploit, Third Party Advisory | |
References | () https://trovent.io/security-advisory-2010-01 - Exploit, Third Party Advisory |
Information
Published : 2021-01-08 18:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28208
Mitre link : CVE-2020-28208
CVE.ORG link : CVE-2020-28208
JSON object : View
Products Affected
rocket.chat
- rocket.chat
CWE
CWE-203
Observable Discrepancy