{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2016-15014","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-07T19:41:58.828Z","datePublished":"2023-01-07T19:42:46.836Z","dateUpdated":"2024-08-06T03:47:34.921Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T09:59:55.182Z"},"title":"CESNET theme-cesnet resetpassword.php insufficiently protected credentials","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-522","lang":"en","description":"CWE-522 Insufficiently Protected Credentials"}]}],"affected":[{"vendor":"CESNET","product":"theme-cesnet","versions":[{"version":"1.x","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in CESNET theme-cesnet up to 1.x on ownCloud and classified as problematic. Affected by this vulnerability is an unknown functionality of the file cesnet/core/lostpassword/templates/resetpassword.php. The manipulation leads to insufficiently protected credentials. Attacking locally is a requirement. Upgrading to version 2.0.0 is able to address this issue. The identifier of the patch is 2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6. It is recommended to upgrade the affected component. The identifier VDB-217633 was assigned to this vulnerability."},{"lang":"de","value":"In CESNET theme-cesnet bis 1.x für ownCloud wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion der Datei cesnet/core/lostpassword/templates/resetpassword.php. Durch das Beeinflussen mit unbekannten Daten kann eine insufficiently protected credentials-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Ein Aktualisieren auf die Version 2.0.0 vermag dieses Problem zu lösen. Der Patch wird als 2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-01-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-01-30T07:31:05.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.217633","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.217633","tags":["signature","permissions-required"]},{"url":"https://github.com/CESNET/theme-cesnet/pull/1","tags":["issue-tracking"]},{"url":"https://github.com/CESNET/theme-cesnet/commit/2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6","tags":["patch"]},{"url":"https://github.com/CESNET/theme-cesnet/releases/tag/2.0.0","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T03:47:34.921Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.217633","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.217633","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/CESNET/theme-cesnet/pull/1","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/CESNET/theme-cesnet/commit/2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6","tags":["patch","x_transferred"]},{"url":"https://github.com/CESNET/theme-cesnet/releases/tag/2.0.0","tags":["patch","x_transferred"]}]}]}}