Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-27747 PoC — Click Studios Passwordstate 安全漏洞

Source
Associated Vulnerability
Title:Click Studios Passwordstate 安全漏洞 (CVE-2020-27747)
Description:Click Studios Passwordstate(passwordstate)是澳大利亚Click Studios团队的一款密码管理软件。该软件为用户提供了密码保存功能,用户可以在软件中记录自己的各种账号和密码,软件还会保证账号密码的安全。该软件为用户提供了密码保存功能,用户可以在软件中记录自己的各种账号和密码,软件还会保证账号密码的安全。 Click Studios Passwordstate 8.9 (Build 8973) 存在安全漏洞,该漏洞源于如果系统的用户已经为自己分配了一个PIN码,以
Description
Possible Account Takeover | Brute Force Ability
Readme
# CVE-2020-27747
Possible Account Takeover | Brute Force Ability

[Suggested description]
An issue was discovered in Click Studios Passwordstate 8.9 (Build 8973).
If the user of the system has assigned himself a PIN code for entering
from a mobile device using the built-in generator (4 digits), a remote
attacker has the opportunity to conduct a brute force attack on this
PIN code.
------------------------------------------
[Additional Information]
A letter was sent to the vendor about the vulnerability.
------------------------------------------
[VulnerabilityType Other]
CWE-307: Improper Restriction of Excessive Authentication Attempts
------------------------------------------
[Vendor of Product]
Click Studios (https://www.clickstudios.com.au/)
------------------------------------------
[Affected Product Code Base]
Affected version: Passwordstate 8.9 (Build 8973). There are no fixed versions
------------------------------------------
[Affected Component]
Mobile login page
------------------------------------------
[Attack Type]
Remote
------------------------------------------
[Impact Information Disclosure]
true
------------------------------------------
[Attack Vectors]
If the user of the system has assigned himself a PIN code for entering
from a mobile device using the built-in generator (4 digits), a remote
attacker has the opportunity to conduct a brute force attack on this
PIN code.
------------------------------------------
[Discoverer]
Dmitry Kuramin (Jet Infosystems, jet.su)
------------------------------------------
[Reference]
https://jet.su
File Snapshot

[4.0K] /data/pocs/b9a254acb05dce4ebd9220db662158679ac8cb99 ├── [132K] account_takeover_result.jpg ├── [ 64K] pin_by_def_gen_only_num4.jpg └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.