{"vulnerability": "CVE-2020-7378", "sightings": [{"uuid": "081a564a-9c28-4a84-a075-6e8a6d0d20a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-7378", "type": "seen", "source": "https://t.me/cibsecurity/16794", "content": "\u203c CVE-2020-7378 \u203c\n\nCRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-24T20:46:55.000000Z"}, {"uuid": "30930faf-005b-40d9-8798-91ae69980a27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-7378", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3785", "content": "#exploit\nCVE-2021-3281:\nThere is a Directory Traversal vulnerability in django.utils.archive.py, lineno:171, in Class TarArchive\nhttps://github.com/lwzSoviet/CVE-2021-3281\n\nCVE-2020-7378:\nPassword Reset Vulnerability in OpenCRX (Unauthenticated Account Take Over)\nhttps://github.com/ruthvikvegunta/openCRX-CVE-2020-7378", "creation_timestamp": "2021-07-07T11:47:01.000000Z"}]}