Skip to content

Weakness in "Forgot password"

Moderate
yurikuzn published GHSA-8gv6-8r33-fm7j Feb 29, 2024

Package

EspoCRM (EspoCRM)

Affected versions

<=8.1.1

Patched versions

8.1.2

Description

Summary

An attacker can inject arbitrary IP or domain in "Password Change" page and redirect victim to malicious page that could lead to credential stealing or another attack.

Details

The main problem is that after changing the password, the user is shown a link to the login page, which, if the attack is successful, will redirect the user to the domain or IP controlled by the attacker.

PoC

  1. Go to login page and click on "Forgot Password?".
  2. Enter "Username" and "Email" and submit this request (setting up BurpSuite to intercept this request).
  3. Go to "Proxy" tab in BurpSuite and intercept POST request to "/EspoCRM/api/v1/User/passwordChangeRequest" endpoint.
  4. Change "url" in intercepted request to any IP or domain.
  5. Once email received, click on password reset ling and change password after that click "Login" link on same page.
  6. Victim redirect to IP or domain that pointed in step 4.

Impact

An attacker could use site clone tools to clone site login page and use it to steal credentials.

Severity

Moderate

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Adjacent
Attack complexity
High
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L

CVE ID

CVE-2024-24818

Weaknesses

No CWEs

Credits