Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-26984 PoC — Peppermint 安全漏洞

Source
Associated Vulnerability
Title:Peppermint 安全漏洞 (CVE-2023-26984)
Description:An issue in the password reset function of Peppermint v0.2.4 allows attackers to access the emails and passwords of the Tickets page via a crafted request.
Description
An issue in the password reset function of Peppermint v0.2.4 allows attackers to access the emails and passwords of the Tickets page via a crafted request.
Readme
# CVE-2023-26984

### Vulnerability Explanation:
An issue in the password reset function of Peppermint v0.2.4 allows attackers to access the emails and passwords of the Tickets page via a crafted request.

### Attack Vectors:
The attacker had to log in with the user role and reset the password. Then intercept the traffic and change the id to admin role or another user. (An attacker can see the email and password of the Tickets page if they create a ticket.). After that, the attacker can log in with the new password with the admin account.

### Affected: 
- http://localhost:5001/settings
- http://localhost:5001/api/v1/users/resetpassword

- POST 
  -  /api/v1/users/resetpassword
    - {"password":"P@ssw0rd","id":1}

### Tested on: 
1. peppermint version 0.2.4 (https://github.com/Peppermint-Lab/peppermint/tree/master)

### Steps to attack:
1. Enter your username and password; the account must have low privileges.
2. Select View profile, select Password and intercept the traffic, fill out the new password.
3. Change the id to admin id and forward the request.
4. Now you can login with admin account.

### Discoverer:
:shipit: Thapanarath Khempetch

### Disclosure Timeline:
- 2023–02–25: Vulnerability discovered.
- 2023–02–26: Vulnerability reported to the MITRE corporation.
- 2023–03–29: CVE has been reserved.
- 2023–03–29: Public disclosure of the vulnerability.

Reference:

1. 

2.

3. https://github.com/Peppermint-Lab/peppermint/tree/master

4. https://peppermint.sh/ 
File Snapshot

[4.0K] /data/pocs/17adae007ce1dd5f17dbdccaaeeeaee38726cd2c └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →