In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
References
Link | Resource |
---|---|
https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Mend
Published: 2021-11-11T07:10:11
Updated: 2021-11-11T07:10:11
Reserved: 2021-01-22T00:00:00
Link: CVE-2021-25980
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-11-11T07:15:11.380
Modified: 2021-11-16T17:19:46.597
Link: CVE-2021-25980
JSON object: View
Redhat Information
No data.
CWE