First published: Wed Jan 10 2024(Updated: )
A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to silently create a recovery pass code for any user.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/wwbn/avideo | <=12.4 | |
WWBN AVideo | =15fed957fb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50172 is classified as a high severity vulnerability due to its potential to allow unauthorized recovery code generation.
To remediate CVE-2023-50172, update the WWBN AVideo software to a version that addresses this vulnerability.
CVE-2023-50172 affects WWBN AVideo versions up to and including 12.4 and commit 15fed957fb.
Exploitation of CVE-2023-50172 could lead to unauthorized users creating recovery pass codes without notification.
For detailed information on CVE-2023-50172, refer to the official security advisories and commit logs related to the WWBN AVideo project.