Vulnerabilities > CVE-2010-4626 - Cryptographic Issues vulnerability in Mybb
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The my_rand function in functions.php in MyBB (aka MyBulletinBoard) before 1.4.12 does not properly use the PHP mt_rand function, which makes it easier for remote attackers to obtain access to an arbitrary account by requesting a reset of the account's password, and then conducting a brute-force attack.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
References
- http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/
- http://dev.mybboard.net/issues/843
- http://dev.mybboard.net/projects/mybb/repository/revisions/4872
- http://openwall.com/lists/oss-security/2010/10/08/7
- http://openwall.com/lists/oss-security/2010/10/11/8
- http://openwall.com/lists/oss-security/2010/12/06/2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64516
- http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64516
- http://openwall.com/lists/oss-security/2010/12/06/2
- http://openwall.com/lists/oss-security/2010/10/11/8
- http://openwall.com/lists/oss-security/2010/10/08/7
- http://dev.mybboard.net/projects/mybb/repository/revisions/4872
- http://dev.mybboard.net/issues/843