Learn about CVE-2019-13240, a vulnerability in GLPI versions before 9.4.1 allowing unauthorized password changes. Find mitigation steps and update recommendations.
A vulnerability has been identified in GLPI versions prior to 9.4.1 that allows an attacker to change a user's password within 24 hours of a successful password reset using only the user's email address.
Understanding CVE-2019-13240
This CVE relates to a security issue in GLPI software versions before 9.4.1 that enables unauthorized password changes.
What is CVE-2019-13240?
This vulnerability in GLPI software versions prior to 9.4.1 allows an attacker to modify a user's password within 24 hours of a successful password reset, using only the user's email address.
The Impact of CVE-2019-13240
The impact of this vulnerability is that an attacker can change a user's password without requiring any additional information, compromising the user's account security.
Technical Details of CVE-2019-13240
This section provides technical details about the vulnerability.
Vulnerability Description
After a user successfully resets their password, an attacker can change the user's password within the next 24 hours using only the associated email address.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability allows attackers to exploit the password reset functionality to change a user's password within 24 hours using only the user's email address.
Mitigation and Prevention
Protecting against and addressing the CVE-2019-13240 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates