2 results (0.002 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well. Una omisión de autorización en b2evolution permite a atacantes remotos no autenticados predecir tokens de restablecimiento de contraseña para cualquier usuario mediante el uso de una función de aleatoriedad incorrecta. • https://b2evolution.net/downloads/7-2-5-stable https://github.com/b2evolution/b2evolution/blob/master/inc/_core/_misc.funcs.php#L5955 https://github.com/b2evolution/b2evolution/issues/114 • CWE-330: Use of Insufficiently Random Values •

CVSS: 8.8EPSS: 4%CPEs: 1EXPL: 3

SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab. Una inyección SQL en el componente "evoadm.php" de b2evolution versión v7.2.2-stable, permite a atacantes remotos obtener información confidencial de la base de datos al inyectar comandos SQL en el parámetro "cf_name" al crear un nuevo filtro en la pestaña "Colecciones" b2evolution version 7-2-2 suffers from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/49840 http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644 https://github.com/b2evolution/b2evolution/issues/109 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •