Wiz Agents & Workflows are here

CVE-2023-31287
C# vulnerability analysis and mitigation

Overview

An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email and contain a token used to reset the password. The token remains valid even after the password reset and can be used a second time to change the password of the corresponding user within a 3-hour window after issuance. The token is sent as a query parameter when resetting, allowing an attacker with access to the browser history to reuse the token to take over the account (Serenity Commit, SEC Advisory).

Technical details

The vulnerability exists in the password reset functionality where tokens remain valid for 3 hours after issuance, even after being used successfully to reset a password. The token is exposed in the URL as a query parameter during the reset process, making it accessible through browser history. This implementation flaw allows the token to be reused multiple times within its validity period (SEC Advisory).

Impact

An attacker with access to a user's browser history can extract the password reset token and use it to change the victim's password, effectively taking over their account. This vulnerability enables account hijacking if an attacker can access the browser history within the 3-hour token validity window (SEC Advisory).

Mitigation and workarounds

The vulnerability was fixed in version 6.7.0 and later. The vendor recommends users either create a new project from the 6.7.0+ template or manually apply the relevant changes from the security update commit. The fix ensures that reset password tokens can only be used once (Serenity Commit).

Community reactions

The vulnerability was discovered and reported by Fabian Densborn from SEC Consult. The vendor, Serenity.is, expressed gratitude to Fabian Densborn and the SEC Consult Vulnerability Lab for responsibly reporting and collaborating on addressing the identified issues (Serenity Commit).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-mvm6-f9r3-fgfxHIGH7.7
  • C#C#
  • AWSSDK.CloudFront
NoYesMar 27, 2026
CVE-2026-33535MEDIUM5.5
  • C#C#
  • Magick.NET-Q8-arm64
NoYesMar 26, 2026
CVE-2026-33536MEDIUM4.7
  • C#C#
  • ImageMagick-c++
NoYesMar 26, 2026
GHSA-9r56-3gjq-hqf7LOW3.3
  • C#C#
  • Magick.NET-Q16-OpenMP-x86
NoYesMar 26, 2026
GHSA-6p22-q7w5-33pgLOW3.3
  • C#C#
  • Magick.NET-Q8-x64
NoYesMar 26, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management