Insecure Password Reset Implementation in MFScripts YetiShare
CVE-2019-19735
9.1CRITICAL
What is CVE-2019-19735?
The YetiShare file-sharing platform, specifically in versions 3.5.2 through 4.5.3, contains a security flaw due to its insecure method of generating password reset hashes. The implementation relies solely on the microtime function, making it susceptible to brute-force attacks. An attacker can potentially guess the password reset hash and gain unauthorized access by resetting passwords within a few hours, posing a significant risk to user accounts and data security. Continuous monitoring and application of updates are essential to mitigate this vulnerability.
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
