CVE-2023-1976:
Answer vulnerable to account takeover because password reset links do not expire
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.16687%
CWE
Published
4/11/2023
Updated
4/21/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/answerdev/answer | go | < 1.0.6 | 1.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing cache invalidation after captcha verification. The patch added a DelCaptcha
call in VerifyCaptcha
to delete the captcha token post-verification. Before this fix, the absence of token deletion meant password reset links could be reused indefinitely. The VerifyCaptcha
function's pre-patch behavior directly enabled the non-expiring reset links vulnerability by not removing the verification token from the cache.