Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-26061 PoC — ClickStudios Passwordstate 授权问题漏洞

Source
Associated Vulnerability
Title:ClickStudios Passwordstate 授权问题漏洞 (CVE-2020-26061)
Description:ClickStudios Passwordstate Password Reset Portal prior to build 8501 is affected by an authentication bypass vulnerability. The ResetPassword function does not validate whether the user has successfully authenticated using security questions. An unauthenticated, remote attacker can send a crafted HTTP request to the /account/ResetPassword page to set a new password for any registered user.
Description
CVE-2020-26061 - ClickStudios Passwordstate Password Reset Portal
Readme
# CVE-2020-26061
# ClickStudios Passwordstate Password Reset Portal Authentication Bypass

## Information
**Vendor:** ClickStudios  
**Product:** Passwordstate  
**Versions Affected:** Before 8.5 build 8501  
**Researcher:** Jason Juntunen aka @missing0x00 (https://github.com/missing0x00)  

## Description
ClickStudios Passwordstate Password Reset Portal prior to 8.5 build 8501 is affected by an authentication bypass vulnerability. The ResetPassword function does not validate whether the user has successfully authenticated using security questions. An unauthenticated, remote attacker can send a crafted HTTP request to the /account/ResetPassword page to set a new password for any registered user.

### Proof of Concept
https://github.com/missing0x00/CVE-2020-26061/blob/main/CVE-2020-26061.py

### Remediation
Update the software on all affected devices. This vulnerability was fixed in version 8.5 - Build 8501 (October 12, 2018).

## References
**Vendor Link:** https://www.clickstudios.com.au/passwordstate-changelog.aspx  
**Disclosure Link:** https://github.com/missing0x00/CVE-2020-26061  
**NIST CVE Link:** https://nvd.nist.gov/vuln/detail/CVE-2020-26061  

## Disclaimer
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere.

missingnull
File Snapshot

[4.0K] /data/pocs/af1d247aa02e1e7d57b9bbd4cb81a95158476890 ├── [2.2K] CVE-2020-26061.py └── [1.9K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →