### [CVE-2016-0783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0783) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time. ### POC #### Reference - http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code - http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html #### Github - https://github.com/Quadrupl3d/ICISPD-47-2023 - https://github.com/redp4rrot/ICISPD-47-2023