Súbít #720129: badaso 2.9.7 Cryptographically Weak PRNGbayani

Kurabadaso 2.9.7 Cryptographically Weak PRNG
GaskiyaVulnerability Files: File Function/Line Issue src/Controllers/BadasoAuthController.php forgetPassword() Line 387 Weak random token generation src/Controllers/BadasoAuthController.php verify() Lines 61, 119 Weak verification token src/Controllers/BadasoAuthController.php reRequestVerification() Lines 227, 501, 605 Weak token reuse src/Controllers/BadasoAuthController.php resetPassword() Lines 428-471 No token expiration check Description: A critical authentication bypass vulnerability exists in Badaso ≤ 2.9.7. The password reset functionality uses PHP's cryptographically insecure rand() function to generate 6-digit verification tokens. Combined with the absence of token expiration checks and rate limiting, this allows remote attackers to brute-force password reset tokens and take over any user account.
Manga⚠️ https://note-hxlab.wetolink.com/share/HG1CWbb7FVnq
Màdùmga
 hiro (UID 93548)
Furta12/19/2025 19:57 (2 Wurɗi 전)
Gargajiya12/31/2025 15:46 (12 days later)
HalittaShingilam
VulDB gite339207 [Uasoft badaso har 2.9.7 Token BadasoAuthController.php forgetPassword kura hakki ndiyam]
Nganji20