Files
CVEs-PoC/2021/CVE-2021-28293.md
2025-09-29 21:09:30 +02:00

18 lines
821 B
Markdown

### [CVE-2021-28293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28293)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Seceon aiSIEM before 6.3.2 (build 585) is prone to an unauthenticated account takeover vulnerability in the Forgot Password feature. The lack of correct configuration leads to recovery of the password reset link generated via the password reset functionality, and thus an unauthenticated attacker can set an arbitrary password for any user.
### POC
#### Reference
- https://0xdb9.in/2021/06/07/cve-2021-28293.html
#### Github
No PoCs found on GitHub currently.