A critical vulnerability has been discovered in OpenRapid RapidCMS 1.3.1, a popular content management system (CMS) used for web development. This security issue has been classified as critical and requires immediate attention, as it exposes users to a weak password recovery exploit. The vulnerability affects the file admin/run-movepass.php in an unknown manner and could lead to severe consequences if exploited. It is crucial for RapidCMS users to apply the necessary patch to secure their systems and protect sensitive information.

Code Snippet

The vulnerability in question lies within the admin/run-movepass.php file, and manipulation of the password and password2 arguments can lead to this security exploit. A sample of the vulnerable code is provided below.

if (isset($_POST['password']) && isset($_POST['password2'])) {
  // Process password reset
  $password = $_POST['password'];
  $password2 = $_POST['password2'];
  
  // Validate and compare passwords
  if ($password == $password2) {
    // Vulnerable code
  }
}

Original References

For more in-depth information and background on this vulnerability, you can refer to the following original sources:

1. Vulnerability Details and Patch Identifier
2. Vulnerability Database (VDB) Entry

Exploit Details

Attackers can exploit this vulnerability remotely by manipulating the password and password2 arguments in the affected file. This results in a weak password recovery mechanism, which leaves user accounts and sensitive data vulnerable to unauthorized access.

Public Disclosure

The exploit has been publicly disclosed and is now available for use by both malicious actors and security researchers, making it essential to apply the appropriate patch immediately.

Patch

To fix the issue, users must apply the patch identified as 4dff387283060961c362d50105ff8da8ea40bcbe. This patch addresses the weak password recovery vulnerability in RapidCMS version 1.3.1 by properly securing the password handling process within the run-movepass.php file.

Conclusion

The CVE-2023-4448 vulnerability is an alarming security issue that must be urgently addressed. RapidCMS users must prioritize applying the necessary patch to avoid the potential risk of unauthorized access and data exposure. Ignoring this vulnerability could lead to devastating consequences for the affected websites and their users.

Timeline

Published on: 08/21/2023 02:15:10 UTC
Last modified on: 11/07/2023 04:22:37 UTC