Description
Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass authentication by leveraging a non-empty #wechat#common_member_wechatmp to gain login access to an account via a plugin.php ac=wxregister request (the attacker does not have control over which account will be accessed).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-12979 | Discuz! DiscuzX 3.4, when WeChat login is enabled, allows remote attackers to bypass authentication by leveraging a non-empty #wechat#common_member_wechatmp to gain login access to an account via a plugin.php ac=wxregister request (the attacker does not have control over which account will be accessed). |
References
| Link | Providers |
|---|---|
| https://gitee.com/ComsenzDiscuz/DiscuzX/issues/IPRUI |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:58:19.455Z
Reserved: 2018-12-23T00:00:00.000Z
Link: CVE-2018-20422
No data.
Status : Modified
Published: 2018-12-24T04:29:00.307
Modified: 2024-11-21T04:01:26.813
Link: CVE-2018-20422
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD