NA

CVE-2023-31287

Published: 27/04/2023 Updated: 30/05/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

An issue exists in Serenity Serene (and StartSharp) prior to 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

serenity serene

serenity startsharp

Exploits

Serenity and StartSharp Software versions prior to 671 suffer from file upload to cross site scripting, user enumeration, and reusable password reset token vulnerabilities ...