Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
Metrics
Affected Vendors & Products
References
History
Thu, 08 Aug 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Journyx
Journyx journyx |
|
Weaknesses | CWE-798 | |
CPEs | cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:* | |
Vendors & Products |
Journyx
Journyx journyx |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 08 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 07 Aug 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-321 CWE-334 CWE-799 |
Wed, 07 Aug 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password. | |
Title | Journyx Unauthenticated Password Reset Bruteforce | |
References |
|
MITRE
Status: PUBLISHED
Assigner: KoreLogic
Published: 2024-08-07T23:09:40.249Z
Updated: 2024-08-08T13:28:52.446Z
Reserved: 2024-07-18T19:25:47.090Z
Link: CVE-2024-6890
Vulnrichment
Updated: 2024-08-08T01:29:14.179Z
NVD
Status : Modified
Published: 2024-08-07T23:15:41.543
Modified: 2024-11-21T09:50:28.447
Link: CVE-2024-6890
Redhat
No data.