Skip to content

Jitendra Patro

It's only "not easy" until you learn how.

Menu
  • Home
  • Blog
  • Projects
  • Writeups
    • Advisories
      • CVE writeups
      • Not CVE writeups
    • Android
    • Radio/Satellite Hacks
    • Secure Code Warrior
      • PHP Basic
    • HW Hacks
CVE
CVE - Common Vulnerabilities and Exposures

CVE-2022-33012:- Account Takeover Through Password Reset Poisoning

by PhoenixPosted onOctober 29, 2022July 10, 2025⏱ 2 mins read

The Vendor

Microweber is a Drag-and-Drop PHP CMS with more than 2.5k stars on Github. It’s based on the PHP Laravel Framework and you can make any kind of website, online store, and blog with it. But like every software on this planet it has vulnerabilities and one of those vulnerabilities is the one I’m disclosing today.

Timeline

07/06/2022 – Found the vulnerability

08/06/2022 – Submitted a CVE request to MITRE

13/06/2022 – CVE record created

28/06/2022 – Got mail from MITRE regarding the CVE ID being allocated

01/07/2022 – Sent first email to vendor mentioning about the vulnerability.

16/07/2022 – Sent second email with a link to the video below.

29/10/2022 – Disclosed the vulnerability after waiting for more than 120 days.

The Vulnerability

The following video does more justice to the title of this post than me writing hundreds of words explaining the vulnerability in detail. For those who couldn’t understand what’s happening in the video, you can read a simple proof of concept here. If you want to learn how this vulnerability would look from a source code review perspective, then you can read this article. As the vendor didn’t respond even after 120 days, I’m not going to show the vulnerable code/function here and will let them find it for themselves. It’s time some people learn to take security more seriously.

Conclusion

I’m starting to feel that security is not taken as seriously in the Open Source community as it should be. This lackadaisical approach of Open Source software vendors towards security of their own software is appalling. Anyways, I’d to do my duty and disclose this vulnerability or this CVE ID would’ve ended being forfeited. As always, thanks for reading and this time… watching!

Peace!

Posted in Advisories, CVE writeups, WriteupsTagged Account Takeover, CMS, CVE, MITRE, php, Security, vulnerability

Published by Phoenix

View all posts by Phoenix

Post navigation

Prev CVE-2022-33994:- Stored XSS in WordPress
Next ModSecurity with OWASP CRS – Part 1: Installation

About The Blog

I created this blog to share the knowledge I've gained over the years and things that I'm yet to learn. Presently, my posts will be mainly focused on Open Source software, Information Security and Hacking. Happy Learning!

Recent Posts

  • OWASP Android UnCrackable Level 2
  • OWASP Android UnCrackable Level 1
  • Project: Wireless Hacks!
  • Emulating AARCH64(ARM64) with QEMU – Part 1
  • ModSecurity with OWASP CRS – Part 1: Installation
  • CVE-2022-33012:- Account Takeover Through Password Reset Poisoning
  • CVE-2022-33994:- Stored XSS in WordPress

Archives

  • 2023
  • 2022
  • 2021

Categories

  • Advisories
  • Android
  • CVE writeups
  • HW Hacks
  • ModSecurity
  • Not CVE writeups
  • PHP Basic
  • Projects
  • Radio/Satellite Hacks
  • Secure Code Warrior
  • Tutorials
  • Writeups

Tags

aarch64 access control Account Takeover algorithm Android apache Azure Bitwarden C CMS code Core Rule Set CVE Debian dns docker Email emulation first post Frida gcloud cli git Google Cloud HCL HTTP Headers IDOR injection installing-openvpn-as iptables Java JavaScript Linode Linux mail MFA Microsxxt MITRE MobSF mysql Networking nextcloud Open Source openvpn OpenVPN 3 ovpn-dco OWASP pagespeed password manager path traversal performance php php-fpm postfix Project proxy QEMU Radio restricting-ssh rootless docker securing-ssh Security security misconfig sensitive data exposure Shadowsocks SMIL sql ssh ssl sslh sslh-proxy su sudo SVG Terraform transparent-sslh two-factor-auth ubuntu virtualization vulnerability WAF webserver WordPress XSS

Contact Me

  • GitHub
  • LinkedIn
  • Mail
  • GitHub
© 2024 Jitendra Patro.