icon

We found results for “

CVE-2022-22110

Date: January 5, 2022

Overview

The “DaybydayCRM” enforces weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.

Details

DaybydayCRM does not perform any password length validation when changing a password. When a user who has “Update a User” access set in “Roles and Permission” tries to update his password, weak passwords such as single characters like letter “a” are accepted by the application. An attacker could leverage this to guess the user’s password with little effort.

PoC Details

Login to the application as a user with privileges of “Update a User”.
go to settings and change your password. You are now able to change your password to anything including a 1 character password, without any minimum length or strength validation from the application’s side.

Affected Environments

bottelet/flarepoint - 1.1 through 2.2.0

Prevention

Update to 2.2.1 in "bottelet/flarepoint" package, 2.2.1 in "Bottelet/DaybydayCRM" repo.

Language: PHP

Good to know:

icon

Weak Password Requirements

CWE-521
icon

Upgrade Version

Upgrade to version bottelet/flarepoint - 2.2.1

Learn More

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope (S): Unchanged
Confidentiality (C): High
Integrity (I): None
Availability (A): None
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (AU): Single
Confidentiality (C): Partial
Integrity (I): None
Availability (A): None
Additional information: