I was browsing the one other forum I am a part of and ran into this topic, which I thought you guys might find interesting. One of our members discovered a very basic vulnerability with SMF which allows pretty much anyone with half a brain to reset anyone else’s password, so long as they have their user ID. Apparently the password reset code is a hash which is always 10 chars long (yes I tested on JGO too) which translates into 1,099,511,627,776 possible reset URLs. That’s actually relatively small compared to if the system produced reset codes of varying lengths. I’m sure it would be very simple to write a script to try them all. Kinda scary to me.
Here’s a link to the original post on EZ: https://evilzone.org/hacking-and-security/taking-over-your-evilzone-account-the-easy-way/msg92363/?topicseen#msg92363
Hopefully one of JGO’s admins can disable the password resetting for now until either you guys or SMF’s devs fix it. This can’t be the first time it’s come up.