CVE-2023-27576

An issue was discovered in phpList before 3.6.14. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission. Specifically, for a request with updatepassword=1, a modified request (manipulating both the ID parameter and the associated username) can bypass the intended email confirmation requirement. For example, the attacker can start from an updatepassword=1 request with their own ID number, and change the ID number to 1 (representing the super admin account) and change the username to admin2. In the first step, the attacker changes the super admin's email address to one under the attacker's control. In the second step, the attacker performs a password reset for the super admin account. The new password allows login as the super admin, i.e., a successful account takeover.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phplist:phplist:3.6.12:*:*:*:*:*:*:*

History

21 Nov 2024, 07:53

Type Values Removed Values Added
References () https://cupc4k3.lol/cve-2023-27576-hacking-phplist-how-i-gained-super-admin-access-44c7c90d82da - Exploit, Technical Description, Third Party Advisory () https://cupc4k3.lol/cve-2023-27576-hacking-phplist-how-i-gained-super-admin-access-44c7c90d82da - Exploit, Technical Description, Third Party Advisory
References () https://github.com/phpList/phplist3/pull/986 - () https://github.com/phpList/phplist3/pull/986 -
References () https://www.phplist.org/newslist/phplist-3-6-14-release-notes/ - () https://www.phplist.org/newslist/phplist-3-6-14-release-notes/ -

07 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-639

06 Nov 2023, 06:15

Type Values Removed Values Added
Summary An issue was discovered in phpList 3.6.12. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission. Specifically, for a request with updatepassword=1, a modified request (manipulating both the ID parameter and the associated username) can bypass the intended email confirmation requirement. For example, the attacker can start from an updatepassword=1 request with their own ID number, and change the ID number to 1 (representing the super admin account) and change the username to admin2. In the first step, the attacker changes the super admin's email address to one under the attacker's control. In the second step, the attacker performs a password reset for the super admin account. The new password allows login as the super admin, i.e., a successful account takeover. An issue was discovered in phpList before 3.6.14. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission. Specifically, for a request with updatepassword=1, a modified request (manipulating both the ID parameter and the associated username) can bypass the intended email confirmation requirement. For example, the attacker can start from an updatepassword=1 request with their own ID number, and change the ID number to 1 (representing the super admin account) and change the username to admin2. In the first step, the attacker changes the super admin's email address to one under the attacker's control. In the second step, the attacker performs a password reset for the super admin account. The new password allows login as the super admin, i.e., a successful account takeover.
References
  • (MISC) https://github.com/phpList/phplist3/pull/986 -
  • (CONFIRM) https://www.phplist.org/newslist/phplist-3-6-14-release-notes/ -

28 Aug 2023, 17:15

Type Values Removed Values Added
Summary An issue was discovered in phpList 3.6.12. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission. An issue was discovered in phpList 3.6.12. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission. Specifically, for a request with updatepassword=1, a modified request (manipulating both the ID parameter and the associated username) can bypass the intended email confirmation requirement. For example, the attacker can start from an updatepassword=1 request with their own ID number, and change the ID number to 1 (representing the super admin account) and change the username to admin2. In the first step, the attacker changes the super admin's email address to one under the attacker's control. In the second step, the attacker performs a password reset for the super admin account. The new password allows login as the super admin, i.e., a successful account takeover.

23 Aug 2023, 17:00

Type Values Removed Values Added
First Time Phplist
Phplist phplist
References (MISC) https://cupc4k3.lol/cve-2023-27576-hacking-phplist-how-i-gained-super-admin-access-44c7c90d82da - (MISC) https://cupc4k3.lol/cve-2023-27576-hacking-phplist-how-i-gained-super-admin-access-44c7c90d82da - Exploit, Technical Description, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:phplist:phplist:3.6.12:*:*:*:*:*:*:*

18 Aug 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-18 15:15

Updated : 2024-11-21 07:53


NVD link : CVE-2023-27576

Mitre link : CVE-2023-27576

CVE.ORG link : CVE-2023-27576


JSON object : View

Products Affected

phplist

  • phplist
CWE
NVD-CWE-noinfo CWE-639

Authorization Bypass Through User-Controlled Key