Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html | Exploit Third Party Advisory VDB Entry |
| https://github.com/Or4ngm4n/vulnreability-code-review-php/blob/main/Lost%20and%20Found%20Information%20System%20v1.0.txt | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/51795 | |
| http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html | Exploit Third Party Advisory VDB Entry |
| https://github.com/Or4ngm4n/vulnreability-code-review-php/blob/main/Lost%20and%20Found%20Information%20System%20v1.0.txt | Exploit Third Party Advisory |
Configurations
History
11 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2023-11-03 05:15
Updated : 2025-11-11 17:15
NVD link : CVE-2023-38965
Mitre link : CVE-2023-38965
CVE.ORG link : CVE-2023-38965
JSON object : View
Products Affected
oretnom23
- lost_and_found_information_system
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
