Insufficiently random values for generating password reset token in FIWARE Keyrock <= 8.4 allow attackers to disable two factor authorization of any user by predicting the token for the disable_2fa link.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories | third party advisory exploit |