First published: Tue Nov 24 2020(Updated: )
CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Opencrx Opencrx | <=4.3.0 | |
Opencrx Opencrx | =5.0-20200714 | |
Opencrx Opencrx | =5.0-20200715 | |
Opencrx Opencrx | =5.0-20200717 | |
Opencrx Opencrx | =5.0.0 |
Users should update to 5.0-20200904 or later. If an update is infeasible, users should disable the RequestPasswordReset.jsp wizard.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7378 is a vulnerability in CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior that allows an attacker to change the password of any user, including admin-Standard, to any chosen value.
The severity of CVE-2020-7378 is critical with a CVSS score of 9.1.
An attacker who is able to connect to the affected OpenCRX instance can exploit CVE-2020-7378 by changing the password of any user, including admin-Standard, to a value of their choice.
Yes, this issue was resolved in version 5.0-20200718 of CRIXP OpenCRX.
You can find more information about CVE-2020-7378 at the following link: https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/