Brandon Sheley
Well-known member
I ran across this post on twitter and asked for more info, I tagged @Kier and @Mike on twitter
He said he contacted you guys already about it as well.
feel free to move this thread if this isn't the right place for it
He said he contacted you guys already about it as well.
feel free to move this thread if this isn't the right place for it
The PRNG for their password reset mechanism takes values from mt_rand(); and is susceptible to seed recovery attacks
Simply a case of figuring out how the seed is generated, from there you can reset other users passwords (including admins of course)
Writeups on issues w/ PRNG lacking sufficient seeding + another vuln that im not gonna describe (but leads to RCE) coming soon
I'm in contact w/ someone @ xenforo already btw. Gave them info on the PRNG issue a while back. Just need to do the writeups.