Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://pwnit.io/2022/11/23/weak-password-reset-token-leads-to-account-takeover-in-seeddms/ | third party advisory exploit |