CVE-2021-31646

Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html - Broken Link, Third Party Advisory () https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html - Broken Link, Third Party Advisory
References () https://gestsup.fr/index.php?page=download - Patch, Vendor Advisory () https://gestsup.fr/index.php?page=download - Patch, Vendor Advisory
References () https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch - Patch, Vendor Advisory () https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch - Patch, Vendor Advisory

Information

Published : 2021-04-26 19:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-31646

Mitre link : CVE-2021-31646

CVE.ORG link : CVE-2021-31646


JSON object : View

Products Affected

gestsup

  • gestsup
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts