| |
Vulnerability CVE-2021-25980
Published: 2021-11-11
Description: |
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the ??forgot password? functionality to reset the victim??s password and successfully take over their account. |
Type:
CWE-74
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.8/10 |
6.4/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
Partial |
References: |
https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|