idno/known is vulnerable to Privilege Escalation. The vulnerability exists due to the lack of validation in the password reset token in the getContent
function of Reset.php
, allowing an attacker to account takeover through the password reset poisoning by providing a malicious HTTP header.
CPE | Name | Operator | Version |
---|---|---|---|
idno/known | le | 1.2.2 | |
idno/known | le | 1.2.2 |
blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
github.com/advisories/GHSA-p757-4v3p-j74f
github.com/idno/known
github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Account%20Takeover#account-takeover-through-password-reset-poisoning
www.pethuraj.com/blog/how-i-earned-800-for-host-header-injection-vulnerability/