Advertisement






Ultimate Member 2.39 Arbitrary password reset

CVE Category Price Severity
CVE-2019-10270 CWE-287 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2019-06-16
CPE
cpe:Not available
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019060101

Below is a copy:

Ultimate Member 2.39 Arbitrary password reset
#### [CVE-2019-10270] Ultimate Member 2.39 Arbitrary password reset
 
#### Description ####
 
An arbitrary password reset issue (Incorrect Access Control) has been discovered in the Ultimate Member plugin 2.39 for WordPress.
It is possible (due to lack of verification and correlation between the reset password link key sent by mail and the user_id parameter) to reset the password of another user. 
We only needs to know the user_id, which is publicly available, moreover the user_id parameter is a numerical generated incremental value.
It is possible to modify the passwords for any users or admin WordPress Ultimate Members. 
This could lead to account compromise and privilege escalation.

To exploit vulnerability an simple user on the website using ultimate member has to asking for reset password and modify parameter in order to reset the password of a choosen user.
 
#### Timeline (dd/mm/yyyy) ####
 ++ 12/03/2019 : Initial discovery 
 ++ 13/03/2019 : First contact attempt (email) 
 ++ 13/03/2019 : Response from editor
 ++ 26/03/2019 : Technical details sent to the editor 
 ++ 26/03/2019 : Reply: fix planned for major release 2.40 in late September 
 ++ 15/06/2019 : Release of the advisory 
 
#### Fixes Upgrade to Ultimate Member 2.40 ####
 
#### Affected versions ####
 ++ Versions up to 2.39
 
#### Credits #### 
 ++ Clment CRUCHET <[email protected]>
 
####  Reference #### 
 ++ https://ultimatemember.com/
 

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum