In langgenius/dify v0.10.1, the `/forgot-password/resets` endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Link | Tags |
---|---|
https://huntr.com/bounties/00a8b403-7da5-431e-afa3-40339cf734bf | exploit third party advisory |