Exploits Password Reset Vulnerability in OpenCRX, CVE-2020-7378.
Exploit is because, the developers used Random Class from java.util.Random to generate random tokens in order to reset a users password
Instead they should be using the SecureRandom Class from java.security.SecureRandom to generate random tokens
Tested on v4.2.0, but should also work for other versions reported in the disclosure report of CVE-2020-7378
./openCRXreset.py -u <URL> -user <USERNAME> -pass <PASSWORD>