-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| cartalyst/sentry | composer | <= 2.1.6 |
The vulnerability stems from Sentry's password reset validation logic. The checkResetPasswordCode function (implemented in UserInterface) compares user-provided reset codes with database values without proper null handling. When the database contains NULL (default for users without active reset tokens), passing null/empty values via parameter manipulation (e.g., %00 null byte) triggers a false positive match. This is confirmed by the advisory's description of NULL comparison being exploitable and the referenced blog post showing how empty reset_code parameters bypass validation.