CVE-2020-7245

CRITICAL

Ctfd < 2.2.2 - Password Reset Weakness

Title source: rule
STIX 2.1

Description

Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision.

Scores

CVSS v3 9.8
EPSS 0.0038
EPSS Percentile 59.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-640
Status published
Products (1)
ctfd/ctfd 2.0.0 - 2.2.2
Published Jan 23, 2020
Tracked Since Feb 18, 2026