Vulnerability Description
gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gps-Server | Gps Tracking Software | 2.1.1 |
Related Weaknesses (CWE)
References
- https://gist.github.com/pak0s/ea7a80c2614d9cd43cfb8230c65c9fecPatchThird Party Advisory
- https://s1.gps-server.net/changelog.txtRelease NotesVendor Advisory
- https://www.exploit-db.com/exploits/43431/ExploitThird Party AdvisoryVDB Entry
- https://gist.github.com/pak0s/ea7a80c2614d9cd43cfb8230c65c9fecPatchThird Party Advisory
- https://s1.gps-server.net/changelog.txtRelease NotesVendor Advisory
- https://www.exploit-db.com/exploits/43431/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-17097?
CVE-2017-17097 is a vulnerability with a CVSS score of 9.8 (CRITICAL). gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-...
How severe is CVE-2017-17097?
CVE-2017-17097 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-17097?
Check the references section above for vendor advisories and patch information. Affected products include: Gps-Server Gps Tracking Software.