First published: Thu Jan 25 2024(Updated: )
A vulnerability was found in Qidianbang qdbcrm 1.1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/edit?id=2 of the component Password Reset. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252032. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 1002-X | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0880 is classified as problematic due to its potential for cross-site request forgery.
To fix CVE-2024-0880, implement anti-CSRF tokens and validate user sessions during the password reset process.
CVE-2024-0880 affects Qidianbang qdbcrm version 1.1.0.
CVE-2024-0880 is identified as a cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2024-0880 can be exploited remotely to manipulate the password reset functionality.