Description
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27053 | In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K25434422 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-04T08:47:40.906Z
Reserved: 2020-01-06T00:00:00.000Z
Link: CVE-2020-5899
No data.
Status : Modified
Published: 2020-07-01T15:15:15.203
Modified: 2024-11-21T05:34:47.437
Link: CVE-2020-5899
No data.
OpenCVE Enrichment
No data.
EUVD