Today > 7 Critical | 27 High | 59 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-11717

Jan. 2, 2025, 6:15 p.m.

Product(s) Impacted

CTFd

  • up to 3.7.4

Description

Tokens in CTFd used for account activation and password resetting can be used interchangeably for these operations. When used, they are sent to the server as a GET parameter and they are not single use, which means, that during token expiration time an on-path attacker might reuse such a token to change user's password and take over the account. Moreover, the tokens also include base64 encoded user email. This issue impacts releases up to 3.7.4 and was addressed by pull request 2679 https://github.com/CTFd/CTFd/pull/2679  included in 3.7.5 release.

Weaknesses

CWE-837
Improper Enforcement of a Single, Unique Action

The product requires that an actor should only be able to perform an action once, or to have only one unique action, but the product does not enforce or improperly enforces this restriction.

CWE ID: 837

Date

Published: Jan. 2, 2025, 5:15 p.m.

Last Modified: Jan. 2, 2025, 6:15 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

cvd@cert.pl

References


https://cert.pl/ cvd@cert.pl

https://ctfd.io/ cvd@cert.pl



https://seclists.org/ 134c704f-9b21-4f2e-91b3-4a467353bcc0