Description
In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27053 | In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code. |
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K25434422 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-04T08:47:40.906Z
Reserved: 2020-01-06T00:00:00.000Z
Link: CVE-2020-5899
No data.
Status : Modified
Published: 2020-07-01T15:15:15.203
Modified: 2024-11-21T05:34:47.437
Link: CVE-2020-5899
No data.
OpenCVE Enrichment
No data.
EUVD