Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack.
References
Link | Resource |
---|---|
https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html | Broken Link Third Party Advisory |
https://gestsup.fr/index.php?page=download | Patch Vendor Advisory |
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch | Patch Vendor Advisory |
https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html | Broken Link Third Party Advisory |
https://gestsup.fr/index.php?page=download | Patch Vendor Advisory |
https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://dojo.maltem.ca/public/advisories/CVE-2021-31646.html - Broken Link, Third Party Advisory | |
References | () https://gestsup.fr/index.php?page=download - Patch, Vendor Advisory | |
References | () https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.10&type=patch - Patch, Vendor Advisory |
Information
Published : 2021-04-26 19:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31646
Mitre link : CVE-2021-31646
CVE.ORG link : CVE-2021-31646
JSON object : View
Products Affected
gestsup
- gestsup
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts