Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-28372 Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T09:25:48.424Z

Reserved: 2020-01-20T00:00:00

Link: CVE-2020-7245

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-23T23:15:11.597

Modified: 2024-11-21T05:36:54.840

Link: CVE-2020-7245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.