An issue in Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements.# CVE-2024-42850
An issue in the password change function of Silverpeas v6.4.2 and lower allows for the bypassing of password complexity requirements.
## Writeup

When changing your password, upon submission of the new password, the password is first sent in a POST request to an endpoint which checks to ensure that the password is in compliance with complexity requirements.

After Silverpeas has confirmed that the password meets the requirements, a separate POST request is made to update the account with the password with no checks, leading to a possibility of setting a single character password.


[4.0K] /data/pocs/47c7f994e2e30192f0ba10650e2d25bd59d0b7af
├── [113K] badpw.PNG
├── [ 70K] confirmation.PNG
├── [ 19K] login.PNG
├── [ 44K] password_check.PNG
└── [1.0K] README.md
0 directories, 5 files