Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-21352
HistoryMar 03, 2021 - 12:20 a.m.

CVE-2021-21352 Predictable tokens used for password resets

2021-03-0300:20:16
CWE-330
GitHub_M
www.cve.org

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

9.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.3%

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. In TimeTracker before version 1.19.24.5415 tokens used in password reset feature in Time Tracker are based on system time and, therefore, are predictable. This opens a window for brute force attacks to guess user tokens and, once successful, change user passwords, including that of a system administrator. This vulnerability is pathced in version 1.19.24.5415 (started to use more secure tokens) with an additional improvement in 1.19.24.5416 (limited an available window for brute force token guessing).

CNA Affected

[
  {
    "product": "timetracker",
    "vendor": "anuko",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.19.24.5415"
      }
    ]
  }
]

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

9.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.3%

Related for CVELIST:CVE-2021-21352