We found results for “”
CVE-2021-25961
Date: September 29, 2021
Overview
In “SuiteCRM” application, v7.1.7 through v7.10.31 and v7.11-beta through v7.11.20 fail to properly invalidate password reset links that is associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.Details
SuiteCRM application fails to properly invalidate password reset links associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.PoC Details
For demonstration purposes we'll use 2 users -1. Ron - low privileged user
2. Admin - administrator user
Navigate to “Forgot password”, enter username as Ron and email which was configured for Ron's account.A password reset link would be received at the email address. Save the password reset link.
Now login as Admin, go to “employees” and delete the user Ron.
Now go to “admin”, “User management” and create a new user with user id Ron. Then, logout and use the saved reset password link and reset password for user Ron.
Note: In order for this POC to work, you must configure the SMTP settings.
Affected Environments
v7.1.7 - v7.10.31 and v7.11-beta - v7.11.20Prevention
Upgrade to version v7.10.32, v7.11.21 or higherLanguage: PHP
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | Low |
User Interaction (UI): | Required |
Scope (S): | Unchanged |
Confidentiality (C): | High |
Integrity (I): | High |
Availability (A): | High |
Base Score: |
|
---|---|
Access Vector (AV): | Network |
Access Complexity (AC): | Medium |
Authentication (AU): | Single |
Confidentiality (C): | Partial |
Integrity (I): | Partial |
Availability (A): | Partial |
Additional information: |