CVE-2022-30935
Summary
| CVE | CVE-2022-30935 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-09-28 11:15:00 UTC |
| Updated | 2022-09-30 13:35:00 UTC |
| Description | An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well. |
Risk And Classification
Problem Types: CWE-330
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | B2evolution | B2evolution | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 7.2.5-stable | MISC | b2evolution.net | |
| b2evolution/_misc.funcs.php at master · b2evolution/b2evolution · GitHub | MISC | github.com | |
| Potentially severe security flaw · Issue #114 · b2evolution/b2evolution · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.