2024-12-08 03:06:42 +00:00

128 lines
4.4 KiB
JSON

{
"id": "CVE-2020-7245",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-23T23:15:11.597",
"lastModified": "2024-11-21T05:36:54.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision."
},
{
"lang": "es",
"value": "La validaci\u00f3n incorrecta del nombre de usuario en el proceso de registro de CTFd v2.0.0 - v2.2.2 permite a un atacante hacerse cargo de una cuenta arbitraria si se conoce el nombre de usuario y se habilitan los correos electr\u00f3nicos en la instancia de CTFd. Para explotar la vulnerabilidad, uno debe registrarse con un nombre de usuario id\u00e9ntico al nombre de usuario de la v\u00edctima, pero con un espacio en blanco insertado antes y / o despu\u00e9s del nombre de usuario. Esto registrar\u00e1 la cuenta con el mismo nombre de usuario que la v\u00edctima. Despu\u00e9s de iniciar un restablecimiento de contrase\u00f1a para la nueva cuenta, CTFd restablecer\u00e1 la contrase\u00f1a de la cuenta de la v\u00edctima debido a la colisi\u00f3n del nombre de usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 6.8,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ctfd:ctfd:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndIncluding": "2.2.2",
"matchCriteriaId": "A5C47875-21C5-4DA1-822C-03F195DE127B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CTFd/CTFd/pull/1218",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/CTFd/CTFd/releases/tag/2.2.3",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/CTFd/CTFd/pull/1218",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/CTFd/CTFd/releases/tag/2.2.3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
}
]
}