Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-51478 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: YesWiki < 4.4.5 has a critical encryption flaw. πŸ“‰ **Consequences**: Attackers can recover password reset keys. This leads to unauthorized account takeover and full system compromise. πŸ’₯

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-327 (Use of a Broken/Risky Cryptographic Algorithm). πŸ› **Flaw**: Weak encryption + Hardcoded hashing for password reset keys. πŸ”‘ The keys are predictable and reversible.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: YesWiki (French Wiki System). πŸ’» **Product**: YesWiki. πŸ“… **Affected**: Versions **before 4.4.5**. ⚠️ If you are running 4.4.4 or older, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hacker Action**: Recover the hardcoded reset key. πŸ”„ Use it to reset ANY user's password. πŸ”“ **Privileges**: Full account access. πŸ“Š **Data**: Complete confidentiality breach (C:H) and integrity loss (I:L).

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: LOW. 🌐 **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required. πŸš€ **Complexity**: Low (AC:L). It is an easy, remote exploit for anyone.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: No specific PoC code provided in data. πŸ“œ **References**: GitHub commits and GHSA advisory exist.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Verify your YesWiki version. πŸ“‹ **Scan**: Look for version < 4.4.5. πŸ§ͺ **Test**: Check if password reset functionality uses the weak/hardcoded hash mechanism described in the advisory.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“¦ **Patch**: Upgrade to **YesWiki 4.4.5** or later. πŸ”— **Source**: See GitHub commits and GHSA-4fvx-h823-38v3 for official fix details. πŸ”„ Immediate update recommended.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If you cannot upgrade immediately: 1. Disable public password reset if possible. 2. Monitor admin logs for suspicious reset attempts. 3. Isolate the instance from the internet.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. 🚨 **Priority**: Critical. ⚑ CVSS Score indicates High Confidentiality impact. πŸƒβ€β™‚οΈ **Action**: Patch immediately. This allows easy account takeover without authentication.