Miggo Logo

CVE-2023-1976:
Answer vulnerable to account takeover because password reset links do not expire

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.16687%
Published
4/11/2023
Updated
4/21/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/answerdev/answergo< 1.0.61.0.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing cache invalidation after captcha verification. The patch added a DelCaptcha call in VerifyCaptcha to delete the captcha token post-verification. Before this fix, the absence of token deletion meant password reset links could be reused indefinitely. The VerifyCaptcha function's pre-patch behavior directly enabled the non-expiring reset links vulnerability by not removing the verification token from the cache.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*nsw*r**v/*nsw*r is *n op*n-sour** knowl****-**s** *ommunity so*tw*r*. *nsw*r prior to *.*.* is vuln*r**l* to ***ount t*k*ov*r ****us* t** p*sswor* r*s*t link *o*s not *xpir*.

Reasoning

T** vuln*r**ility st*ms *rom missin* ***** inv*li**tion **t*r **pt*** v*ri*i**tion. T** p*t** ***** * `**l**pt***` **ll in `V*ri*y**pt***` to **l*t* t** **pt*** tok*n post-v*ri*i**tion. ***or* t*is *ix, t** **s*n** o* tok*n **l*tion m**nt p*sswor* r*