In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
References
Link | Resource |
---|---|
https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-11-10 23:15
Updated : 2021-11-16 09:19
NVD link : CVE-2021-25980
Mitre link : CVE-2021-25980
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
talkyard
- talkyard