OpenAM (Open Source Edition) 13.0 and later does not properly manage sessions, which allows remote authenticated attackers to change the security questions and reset the login password via unspecified vectors.
The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Link | Tags |
---|---|
http://jvn.jp/en/jp/JVN49995005/index.html | third party advisory |
https://www.cs.themistruct.com/report/wam20181012 | third party advisory permissions required |
https://www.osstech.co.jp/support/am2018-4-1-en | third party advisory |