First published: Wed Apr 18 2018(Updated: )
cmsmadesimple version 2.2.7 contains a Incorrect Access Control vulnerability in the function of send_recovery_email in the line "$url = $config['admin_url'] . '/login.php?recoverme=' . $code;" that can result in Administrator Password Reset Poisoning, specifically a reset URL pointing at an attacker controlled server can be created by using a host header attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Simple CMS | =2.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000158 is classified as a moderate severity vulnerability due to its potential to expose sensitive information and impact user security.
CVE-2018-1000158 can be exploited through an incorrect access control vulnerability that allows an attacker to manipulate password reset URLs.
To fix CVE-2018-1000158, it is recommended to upgrade CMS Made Simple to a version that addresses this vulnerability.
CVE-2018-1000158 specifically affects CMS Made Simple version 2.2.7.
CVE-2018-1000158 can lead to administrative account compromise by allowing attackers to reset passwords using malformed URLs.