Insufficient Password Verification Affecting cartalyst/sentry package, versions <2.1.7


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-CARTALYSTSENTRY-70011
  • published 4 Oct 2016
  • disclosed 4 Oct 2016
  • credit Unknown

Introduced: 4 Oct 2016

CVE NOT AVAILABLE CWE-264 Open this link in a new tab

How to fix?

Upgrade cartalyst/sentry to version 2.1.7 or higher.

Overview

Affected versions of cartalyst/sentry are vulnerable to Insufficient Password Verification. The schema for Eloquent-based users has reset_password_code set to NULL by default. The check for correct $resetCode simply does an equality comparison and returns true if there is a loose match.

If an attacker is able to provide a null reset code to the package, there are no guards against arbitrary anonymous password resets. In many cases, submitting a url-encoded null byte value (%00) will match what's in the database, passing the check and allowing the attacker to set the password to what they wish.

CVSS Scores

version 3.1
Expand this section

Snyk

9.8 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High