CVE-2016-0783
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.
Known Affected Software
14 configuration(s) from 1 vendor(s)
openmeetings
Version:
2.2.0
CPE:
cpe:2.3:a:apache:openmeetings:2.2.0:*:*:*:*:*:*:*
openmeetings
Version:
3.0.7
CPE:
cpe:2.3:a:apache:openmeetings:3.0.7:*:*:*:*:*:*:*
openmeetings
Version:
2.0
CPE:
cpe:2.3:a:apache:openmeetings:2.0:*:*:*:*:*:*:*
openmeetings
Version:
1.0.0
CPE:
cpe:2.3:a:apache:openmeetings:1.0.0:*:*:*:*:*:*:*
openmeetings
Version:
3.1.0
CPE:
cpe:2.3:a:apache:openmeetings:3.1.0:*:*:*:*:*:*:*
openmeetings
Version:
2.1.1
CPE:
cpe:2.3:a:apache:openmeetings:2.1.1:*:*:*:*:*:*:*
openmeetings
Version:
3.0.3
CPE:
cpe:2.3:a:apache:openmeetings:3.0.3:*:*:*:*:*:*:*
openmeetings
Version:
3.0.6
CPE:
cpe:2.3:a:apache:openmeetings:3.0.6:*:*:*:*:*:*:*
openmeetings
Version:
3.0.0
CPE:
cpe:2.3:a:apache:openmeetings:3.0.0:*:*:*:*:*:*:*
openmeetings
Version:
3.0.5
CPE:
cpe:2.3:a:apache:openmeetings:3.0.5:*:*:*:*:*:*:*
openmeetings
Version:
3.0.2
CPE:
cpe:2.3:a:apache:openmeetings:3.0.2:*:*:*:*:*:*:*
openmeetings
Version:
3.0.1
CPE:
cpe:2.3:a:apache:openmeetings:3.0.1:*:*:*:*:*:*:*
openmeetings
Version:
2.1
CPE:
cpe:2.3:a:apache:openmeetings:2.1:*:*:*:*:*:*:*
openmeetings
Version:
3.0.4
CPE:
cpe:2.3:a:apache:openmeetings:3.0.4:*:*:*:*:*:*:*
This vulnerability affects 14 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-codesecalert@redhat.com
-
http://openmeetings.apache.org/security.htmlsecalert@redhat.com Patch Vendor Advisory
-
http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.htmlsecalert@redhat.com
-
http://www.securityfocus.com/archive/1/537886/100/0/threadedsecalert@redhat.com
-
https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOGsecalert@redhat.com
-
http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-codeaf854a3a-2127-422b-91ae-364da2661108
-
http://openmeetings.apache.org/security.htmlaf854a3a-2127-422b-91ae-364da2661108 Patch Vendor Advisory
-
http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/archive/1/537886/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
-
https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOGaf854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
- Description
- The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- Abstraction Level
- Class
Key Information
- Published Date
- April 11, 2016
