Description
The sendHashByUser function in Apache OpenMeetings before 3.1.1 generates predictable password reset tokens, which makes it easier for remote attackers to reset arbitrary user passwords by leveraging knowledge of a user name and the current system time.
Remediation
References
http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code
http://openmeetings.apache.org/security.html
http://packetstormsecurity.com/files/136432/Apache-OpenMeetings-3.1.0-MD5-Hashing.html
http://www.securityfocus.com/archive/1/537886/100/0/threaded
https://www.apache.org/dist/openmeetings/3.1.1/CHANGELOG
Related Vulnerabilities
CVE-2023-29212 Vulnerability in maven package org.xwiki.platform:xwiki-platform-panels-ui
CVE-2023-32070 Vulnerability in maven package org.xwiki.rendering:xwiki-rendering-macro-html
CVE-2020-12265 Vulnerability in npm package decompress-tar
CVE-2017-12647 Vulnerability in maven package com.liferay:com.liferay.knowledge.base.service
CVE-2022-45390 Vulnerability in maven package io.loader:loaderio-jenkins-plugin