ProjectSend < r1295 - Unauthenticated Password Reset via Invalid Token Handling
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2020-28874. PoCs published by varandinawer.
AI-analyzed exploit summary The repository contains a functional Python exploit for CVE-2020-28874, a privilege escalation vulnerability in ProjectSend r1270. The exploit leverages a flaw in the reset password component, allowing an attacker to change any user's password without a valid token.
Description
reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).
Exploits (1)
The repository contains a functional Python exploit for CVE-2020-28874, a privilege escalation vulnerability in ProjectSend r1270. The exploit leverages a flaw in the reset password component, allowing an attacker to change any user's password without a valid token.
References (5)
Scores
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N