// For flags

CVE-2020-10102

 

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Zammad 3.0 through 3.2. The Forgot Password functionality is implemented in a way that would enable an anonymous user to guess valid user emails. In the current implementation, the application responds differently depending on whether the input supplied was recognized as associated with a valid user. This behavior could be used as part of a two-stage automated attack. During the first stage, an attacker would iterate through a list of account names to determine which correspond to valid accounts. During the second stage, the attacker would use a list of common passwords to attempt to brute force credentials for accounts that were recognized by the system in the first stage.

Se detectó un problema en Zammad versiones 3.0 hasta 3.2. La funcionalidad Forgot Password se implementa de una manera que permitiría a un usuario anónimo adivinar correos electrónicos de usuarios válidos. En la implementación actual, la aplicación responde de manera diferente dependiendo de si la entrada suministrada fue reconocida como asociada con un usuario válido. Este comportamiento podría ser usado como parte de un ataque automatizado de dos etapas. Durante la primera etapa, un atacante iteraría por medio de una lista de nombres de cuenta para determinar cuáles corresponden a cuentas válidas. Durante la segunda etapa, el atacante usaría una lista de contraseñas comunes para intentar obtener credenciales de fuerza bruta para las cuentas que fueron reconocidas por el sistema en la primera etapa.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-03-05 CVE Reserved
  • 2020-03-05 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-203: Observable Discrepancy
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zammad
Search vendor "Zammad"
Zammad
Search vendor "Zammad" for product "Zammad"
>= 1.0.0 <= 3.2.0
Search vendor "Zammad" for product "Zammad" and version " >= 1.0.0 <= 3.2.0"
-
Affected