vendor:
Discuz!
by:
80vul
8.8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: Discuz!
Affected Version From: Prior to 6.0.0
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
Discuz! Reset User Password Exploit
Discuz! Reset User Password Exploit is an authentication bypass vulnerability that allows an attacker to reset the password of a user without knowing the original password. This exploit was discovered by 80vul team in 2020 and affects Discuz! versions prior to 6.0.0. The attacker can exploit this vulnerability by sending a crafted HTTP request to the target server. The request contains the username, email, and user ID of the target user. The server then responds with a cookie containing a session ID. The attacker can then use this session ID to reset the user's password.
Mitigation:
Upgrade to the latest version of Discuz! 6.0.0 or later.