Exploit Attempts for Unknown Password Reset Vulnerability

Published: 2024-02-28
Last Updated: 2024-02-28 14:36:16 UTC
by Johannes Ullrich (Version: 1)
5 comment(s)

My Google skills let me down this morning, attempting to figure out which vulnerability is exactly being exploited by these "forgotuserpassword.action" scans. Maybe someone else can help me out here. Based on the scans, I do not believe this is a "normal" password reset vulnerability. Atlassian's Confluence is one suspect using a URL scheme like this, but there may be others. Here are some of the URLs:



The last URL suggests a deserialization vulnerability. These scans have picked up over the last few days:

Graph showing increase in scans for the forgotuserpassword.action url in the last few days.

The last URL above appears to be a simple vulnerability check that will echo back a string if it is successful. Decoded, the URL reads:

a=${#_memberAccess["allowStaticMethodAccess"]=true,#a=@java.lang.Runtime@getRuntime().exec('echo 5d41402abc4b2a76b9719d911017c592').getInputStream(),#b=new java.io.InputStreamReader(#a)


So any ideas as to the specific vulnerability being exploited here?

Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu

5 comment(s)


This has probably already occurred to you, but MD5('hello') = 5d41402abc4b2a76b9719d911017c592
After reading this today came across the following on LinkedIn:


Maybe seems related, but I don't have the time or details to determine so I thought I would just mention it.
this is javascript based.

Diary Archives