FKIE_CVE-2023-34357
Vulnerability from fkie_nvd - Published: 2023-09-07 03:15 - Updated: 2024-11-21 08:07
Severity ?
Summary
Soar Cloud Ltd. HR Portal has a weak Password Recovery Mechanism for Forgotten Password. The reset password link sent out through e-mail, and the link will remain valid after the password has been reset and after the expected expiration date. An attacker with access to the browser history or has the line can thus use the URL again to change the password in order to take over the account.
References
| URL | Tags | ||
|---|---|---|---|
| twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:scshr:hr_portal:7.3.2023.0510:*:*:*:*:*:*:*",
"matchCriteriaId": "7B4925F6-A93D-405C-A152-3E6753255964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:scshr:hr_portal:7.3.2023.0705:*:*:*:*:*:*:*",
"matchCriteriaId": "398FFD5F-CF3E-4159-A46D-F8D706A25F79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nSoar Cloud Ltd. HR Portal has a weak Password Recovery Mechanism for Forgotten Password. The reset password link sent out through e-mail, and the link will remain valid after the password has been reset and after the expected expiration date. An attacker with access to the browser history or has the line can thus use the URL again to change the password in order to take over the account.\n\n\n\n"
},
{
"lang": "es",
"value": "Soar Cloud Ltd. HR Portal dispone de un mecanismo de recuperaci\u00f3n de contrase\u00f1as d\u00e9bil para contrase\u00f1as olvidadas. El enlace de restablecimiento de contrase\u00f1a se env\u00eda a trav\u00e9s del correo electr\u00f3nico, y el enlace seguir\u00e1 siendo v\u00e1lido despu\u00e9s de que la contrase\u00f1a haya sido restablecida y despu\u00e9s de la fecha de caducidad prevista. Un atacante con acceso al historial del navegador o al enlace puede as\u00ed utilizar la URL de nuevo para cambiar la contrase\u00f1a con el fin de hacerse cargo de la cuenta. "
}
],
"id": "CVE-2023-34357",
"lastModified": "2024-11-21T08:07:05.380",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "twcert@cert.org.tw",
"type": "Secondary"
}
]
},
"published": "2023-09-07T03:15:08.263",
"references": [
{
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
],
"url": "https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html"
}
],
"sourceIdentifier": "twcert@cert.org.tw",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-640"
}
],
"source": "twcert@cert.org.tw",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…