Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
wger: cross-tenant password reset and plaintext disclosure via gym=None bypass
Vulnerability Description
wger is a free, open-source workout and fitness manager. Prior to 2.6, the reset_user_password and gym_permissions_user_edit views in wger perform a gym-scope authorization check using Python object comparison (!=) that evaluates None != None as False, silently bypassing the guard when both the attacker and victim have no gym assignment (gym=None). A user with gym.manage_gym permission and gym=None can reset the password of any other gym=None user; the new plaintext password is returned verbatim in the HTML response body, enabling one-shot full account takeover. The victim's original password is invalidated, locking them out permanently. This vulnerability is fixed in 2.6.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vulnerability Type
授权机制不正确
Vulnerability Title
wger 安全漏洞
Vulnerability Description
wger是wger Project开源的使用 Django 编写的自托管 FLOSS 健身/锻炼、营养和体重追踪器。 wger 2.6之前版本存在安全漏洞,该漏洞源于重置密码和权限编辑视图中的健身房范围授权检查使用Python对象比较,当攻击者和受害者均无健身房分配时绕过检查,可能导致账户接管。
CVSS Information
N/A
Vulnerability Type
N/A