CVE-2024-6890

Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:journyx:journyx:11.5.4:*:*:*:*:linux:*:*

History

No history.

Information

Published : 2024-08-07 23:15

Updated : 2024-11-21 09:50


NVD link : CVE-2024-6890

Mitre link : CVE-2024-6890

CVE.ORG link : CVE-2024-6890


JSON object : View

Products Affected

journyx

  • journyx
CWE
CWE-321

Use of Hard-coded Cryptographic Key

CWE-334

Small Space of Random Values

CWE-799

Improper Control of Interaction Frequency

CWE-798

Use of Hard-coded Credentials