OcoMon 4.0RC1 is vulnerable to Incorrect Access Control. Through a request the user can obtain the real email, sending the same request with correct email its possible to account takeover.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://ocomonphp.sourceforge.io/ | third party advisory product |
https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc | third party advisory exploit |