CVE-2024-6890
8.8HIGHPassword reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administra
게시됨: 8/7/2024업데이트됨: 11/21/2024
설명
Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
AI 분석AI 기반
영향받는 제품
journyxjournyx
11.5.4
참조
- https://korelogic.com/Resources/Advisories/KL-001-2024-007.txtExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2024/Aug/5