An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure.
Description
Attack Execution Flow
2
Mitigations
3
Consequences
Indicators
1
Relationships
Resources Required
1