Home

Description

EN DE

A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in YunzMall bis 2.4.2 entdeckt. Sie wurde als kritisch eingestuft. Hierbei geht es um die Funktion changePwd der Datei /app/platform/controllers/ResetpwdController.php der Komponente HTTP POST Request Handler. Dank Manipulation des Arguments pwd mit unbekannten Daten kann eine weak password recovery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-01-08 | Published 2025-01-09 | Updated 2025-01-09 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.0AV:N/AC:L/Au:N/C:N/I:P/A:N

Problem types

Weak Password Recovery

Timeline

2025-01-08:Advisory disclosed
2025-01-08:VulDB entry created
2025-01-08:VulDB entry last update

Credits

glzjin (VulDB User) reporter

References

note.zhaoj.in/share/DsijzdQDJSAp exploit

vuldb.com/?id.290819 (VDB-290819 | YunzMall HTTP POST Request ResetpwdController.php changePwd password recovery) vdb-entry technical-description

vuldb.com/?ctiid.290819 (VDB-290819 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.471663 (Submit #471663 | Yunzmall <=2.4.2 Arbitrary User Password Reset Vulnerability) third-party-advisory

note.zhaoj.in/share/DsijzdQDJSAp exploit

cve.org (CVE-2025-0331)

nvd.nist.gov (CVE-2025-0331)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.