已禁用用户可以通过在 wiki.js 中请求重置密码来绕过锁定(CVE-2024-45298)

admin 2024-09-19 12:00:34 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
已禁用用户可以通过在 wiki.js 中请求重置密码来绕过锁定(CVE-2024-45298)

CVE编号

CVE-2024-45298

利用情况

暂无

补丁情况

N/A

披露时间

2024-09-19
漏洞描述
Wiki.js is an open source wiki app built on Node.js. A disabled user can still gain access to a wiki by abusing the password reset function. While setting up SMTP e-mail's on my server, I tested said e-mails by performing a password reset with my test user. To my shock, not only did it let me reset my password, but after resetting my password I can get into the wiki I was locked out of. The ramifications of this bug is a user can **bypass an account disabling by requesting their password be reset**. All users of wiki.js version `2.5.303` who use any account restrictions and have disabled user are affected. This issue has been addressed in version 2.5.304 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/requarks/wiki/commit/b9fb17d4d4a0956ec35e8c73cc85192552fb8d16
https://github.com/requarks/wiki/security/advisories/GHSA-vwww-c5vg-xgfc
CVSS3评分 4.3
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 无
  • 保密性 无
  • 完整性 低
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE-ID 漏洞类型
CWE-670 控制流实现总是不正确
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2023-41610利用情况 暂无补丁情况 N/A披露时间 2024-09-19漏洞描述Victure PC420 1.1.39被
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2023-41611利用情况 暂无补丁情况 N/A披露时间 2024-09-19漏洞描述Victure PC420 1.1.39被
评论:0   参与:  0