PILOS is an open source front-end for BigBlueButton servers with a built-in load balancer. The password reset component deployed within PILOS uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to PILOS users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. This only affects local user accounts and requires the password reset option to be enabled. This issue has been patched in version 2.3.0.
References
Link | Resource |
---|---|
https://github.com/THM-Health/PILOS/security/advisories/GHSA-mc6f-fj9h-5735 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-11-08T15:39:50.472Z
Updated: 2023-11-08T15:39:50.472Z
Reserved: 2023-10-30T19:57:51.673Z
Link: CVE-2023-47107
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-08T16:15:10.833
Modified: 2023-11-16T14:27:03.320
Link: CVE-2023-47107
JSON object: View
Redhat Information
No data.