CAPEC 50 Password Recovery Exploitation

Draft Standard Medium Risk
Severity High

Description

An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure.

Attack Execution Flow

2

Mitigations

3

Consequences

Indicators

1

Relationships

Resources Required

1