CVE-2022-30935

An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well.
Configurations

Configuration 1 (hide)

cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*

History

30 Sep 2022, 13:35

Type Values Removed Values Added
First Time B2evolution b2evolution
B2evolution
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-330
CPE cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*
References (MISC) https://github.com/b2evolution/b2evolution/issues/114 - (MISC) https://github.com/b2evolution/b2evolution/issues/114 - Issue Tracking, Third Party Advisory
References (MISC) https://b2evolution.net/downloads/7-2-5-stable - (MISC) https://b2evolution.net/downloads/7-2-5-stable - Patch, Vendor Advisory
References (MISC) https://github.com/b2evolution/b2evolution/blob/master/inc/_core/_misc.funcs.php#L5955 - (MISC) https://github.com/b2evolution/b2evolution/blob/master/inc/_core/_misc.funcs.php#L5955 - Patch, Third Party Advisory

28 Sep 2022, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-28 11:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-30935

Mitre link : CVE-2022-30935

CVE.ORG link : CVE-2022-30935


JSON object : View

Products Affected

b2evolution

  • b2evolution
CWE
CWE-330

Use of Insufficiently Random Values