CVE-2024-7659

Aug. 12, 2024, 1:41 p.m.

Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

Products

projectsend

  • up to r1605

Source

cna@vuldb.com

Tags

CVE-2024-7659 details

Published : Aug. 12, 2024, 1:38 p.m.
Last Modified : Aug. 12, 2024, 1:41 p.m.

Description

A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.

CVSS Score

1 2 3.7 4 5 6 7 8 9 10

Weakness

Weakness Name Description
CWE-330 Use of Insufficiently Random Values The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

Base Score

3.7

Exploitability Score

2.2

Impact Score

1.4

Base Severity

LOW

This website uses the NVD API, but is not approved or certified by it.