Vulnerability Description
The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbitrary user passwords via a crafted request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| B2Evolution | B2Evolution | <= 6.7.8 |
Related Weaknesses (CWE)
References
- http://b2evolution.net/downloads/6-7-9-stablePatchRelease NotesVendor Advisory
- http://www.securityfocus.com/bid/95006Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037393
- https://github.com/b2evolution/b2evolution/issues/33Issue TrackingPatchThird Party Advisory
- http://b2evolution.net/downloads/6-7-9-stablePatchRelease NotesVendor Advisory
- http://www.securityfocus.com/bid/95006Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037393
- https://github.com/b2evolution/b2evolution/issues/33Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2016-9479?
CVE-2016-9479 is a vulnerability with a CVSS score of 7.5 (HIGH). The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbitrary user passwords via a crafted request.
How severe is CVE-2016-9479?
CVE-2016-9479 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9479?
Check the references section above for vendor advisories and patch information. Affected products include: B2Evolution B2Evolution.