Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-26061 PoC — ClickStudios Passwordstate 授权问题漏洞

Source
Associated Vulnerability
Title:ClickStudios Passwordstate 授权问题漏洞 (CVE-2020-26061)
Description:clickstudios passwordstate(passwordstate)是澳大利亚clickstudios的一款密码管理软件。该软件为用户提供了密码保存功能,用户可以在软件中记录自己的各种账号和密码,软件还会保证账号密码的安全。 ClickStudios Passwordstate 8501之前版本存在安全漏洞,该漏洞源于ResetPassword函数不验证用户是否通过安全问题成功地进行了身份验证。攻击者可利用该漏洞可以向/account/ResetPassword页面发送精心设计的HTTP请求
Description
CVE-2020-26061 - ClickStudios Passwordstate Password Reset Portal
Readme
# CVE-2020-26061
# ClickStudios Passwordstate Password Reset Portal Authentication Bypass

## Information
**Vendor:** ClickStudios  
**Product:** Passwordstate  
**Versions Affected:** Before 8.5 build 8501  
**Researcher:** Jason Juntunen aka @missing0x00 (https://github.com/missing0x00)  

## Description
ClickStudios Passwordstate Password Reset Portal prior to 8.5 build 8501 is affected by an authentication bypass vulnerability. The ResetPassword function does not validate whether the user has successfully authenticated using security questions. An unauthenticated, remote attacker can send a crafted HTTP request to the /account/ResetPassword page to set a new password for any registered user.

### Proof of Concept
https://github.com/missing0x00/CVE-2020-26061/blob/main/CVE-2020-26061.py

### Remediation
Update the software on all affected devices. This vulnerability was fixed in version 8.5 - Build 8501 (October 12, 2018).

## References
**Vendor Link:** https://www.clickstudios.com.au/passwordstate-changelog.aspx  
**Disclosure Link:** https://github.com/missing0x00/CVE-2020-26061  
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2020-26061  

## Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere.

missingnull
File Snapshot

[4.0K] /data/pocs/af1d247aa02e1e7d57b9bbd4cb81a95158476890 ├── [2.2K] CVE-2020-26061.py └── [1.9K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.