Vulnerabilities > CVE-2017-17097 - Weak Password Recovery Mechanism for Forgotten Password vulnerability in Gps-Server GPS Tracking Software

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
gps-server
CWE-640
exploit available

Summary

gps-server.net GPS Tracking Software (self hosted) 2.x has a password reset procedure that immediately resets passwords upon an unauthenticated request, and then sends e-mail with a predictable (date-based) password to the admin, which makes it easier for remote attackers to obtain access by predicting this new password. This is related to the use of gmdate for password creation in fn_connect.php.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Password Recovery Exploitation
    An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure. Most of them use only one security question . For instance, mother's maiden name tends to be a fairly popular one. Unfortunately in many cases this information is not very hard to find, especially if the attacker knows the legitimate user. These generic security questions are also re-used across many applications, thus making them even more insecure. An attacker could for instance overhear a coworker talking to a bank representative at the work place and supplying their mother's maiden name for verification purposes. An attacker can then try to log in into one of the victim's accounts, click on "forgot password" and there is a good chance that the security question there will be to provide mother's maiden name. A weak password recovery scheme totally undermines the effectiveness of a strong password scheme.

Exploit-Db

descriptiongps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities. CVE-2017-17097,CVE-2017-17098. Webapps exploit for PHP platform
fileexploits/php/webapps/43431.txt
idEDB-ID:43431
last seen2018-01-24
modified2018-01-05
platformphp
port
published2018-01-05
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/43431/
titlegps-server.net GPS Tracking Software < 3.1 - Multiple Vulnerabilities
typewebapps

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/145726/gpstracking-exec.txt
idPACKETSTORM:145726
last seen2018-01-07
published2018-01-06
reporterNoman Riffat
sourcehttps://packetstormsecurity.com/files/145726/gps-server.net-GPS-Tracking-Software-3.0-Code-Injection-Password-Reset.html
titlegps-server.net GPS Tracking Software 3.0 Code Injection / Password Reset