Weak Password Recovery Mechanism for Forgotten Password Affecting cartalyst/sentry package, versions >=0.0.0
Threat Intelligence
Exploit Maturity
Proof of concept
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-CARTALYSTSENTRY-6854280
- published 16 May 2024
- disclosed 15 May 2024
- credit Unknown
How to fix?
There is no fixed version for cartalyst/sentry
.
Overview
Affected versions of this package are vulnerable to Weak Password Recovery Mechanism for Forgotten Password during the password reset process. An attacker can manipulate any user's password by exploiting the handling of null password reset codes.
References
CVSS Scores
version 3.1