漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered in phpList before 3.6.14. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission. Specifically, for a request with updatepassword=1, a modified request (manipulating both the ID parameter and the associated username) can bypass the intended email confirmation requirement. For example, the attacker can start from an updatepassword=1 request with their own ID number, and change the ID number to 1 (representing the super admin account) and change the username to admin2. In the first step, the attacker changes the super admin's email address to one under the attacker's control. In the second step, the attacker performs a password reset for the super admin account. The new password allows login as the super admin, i.e., a successful account takeover.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
phplist 安全漏洞
Vulnerability Description
phplist是英国phplist公司的一套开源的新闻通讯和电子邮件营销软件。 phplist 3.6.12版本存在安全漏洞,该漏洞源于存在访问错误,可以操纵和编辑系统超级管理员的数据,从而可以对具有超级管理员权限的用户进行帐户接管。
CVSS Information
N/A
Vulnerability Type
N/A