Vulnerability Description
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Nginx Controller | >= 3.0.0, <= 3.4.0 |
Related Weaknesses (CWE)
References
- https://support.f5.com/csp/article/K25434422Vendor Advisory
- https://support.f5.com/csp/article/K25434422Vendor Advisory
FAQ
What is CVE-2020-5899?
CVE-2020-5899 is a vulnerability with a CVSS score of 7.8 (HIGH). In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database con...
How severe is CVE-2020-5899?
CVE-2020-5899 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5899?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Nginx Controller.