Lucene search

K
packetstormRafael PedreroPACKETSTORM:150438
HistoryNov 22, 2018 - 12:00 a.m.

Consona Password Reset Security Bypass

2018-11-2200:00:00
Rafael Pedrero
packetstormsecurity.com
118

EPSS

0.017

Percentile

87.7%

`Hi!!  
  
8 years ago, I discovered this vulnerability, CVE-2010-1910, and now, you  
can see the details.  
  
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1910  
  
The login page, "/sdcxuser/asp/login.asp", had a commented access to the  
page that allowed to change the password of any user, with a link with text  
"Forgot your password".  
  
The link that had the vulnerability was: "/adccommonn/asp/forgotpass.asp".  
  
You could enter any username and password without being authenticated and  
change it, administrator or any other user.  
  
<!--  
# Exploit Title: Multiple Consona Products Password Reset Security Bypass  
Vulnerability  
# Date: 22-03-2010  
# Exploit Author: Rafael Pedrero  
# Vendor Homepage: http://www.consona.com/  
# Software Link: http://www.consona.com/  
# Version: Consona Consona Subscriber Assistance, Consona Consona Live  
Assistance, Consona Consona Dynamic Agent  
# Tested on: all  
# CVE : CVE-2010-1910  
# Category: webapps  
  
1. Description  
  
The Forgot Password implementation in Consona Live Assistance, Dynamic  
Agent, and Subscriber Assistance allows remote attackers to reset passwords  
of accounts with blank Hint questions and Hint answers by sending an empty  
value for each of these two Hint fields.  
  
  
2. Proof of Concept  
  
http://X.X.X.X/adccommonn/asp/forgotpass.asp  
  
Enter any username and password without being authenticated and change it,  
it's not necessary to know the current one since it's not used.  
  
  
3. Solution:  
  
The vendor has released updates. See  
http://www.consona.com/Content/CRM/Support/SecurityBulletin_April2010.pdf  
  
-->  
  
  
`

EPSS

0.017

Percentile

87.7%

Related for PACKETSTORM:150438