Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-25980

Опубликовано: 11 нояб. 2021
Источник: nvd
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:talkyard:talkyard:*:*:*:*:*:*:*:*
Версия от 0.04.01 (включая) до 0.6.74-wip-63220cb (включая)
cpe:2.3:a:talkyard:talkyard:*:*:*:*:*:*:*:*
Версия от 0.2020.22-wip-b2e97fe0e (включая) до 0.2021.02-wip-879ef3fe1 (включая)
cpe:2.3:a:talkyard:talkyard:*:*:*:*:*:*:*:*
Версия от tyse-v0.2021.02-879ef3fe1-regular (включая) до tyse-v0.2021.28-af66b6905-regular (включая)

EPSS

Процентиль: 84%
0.02198
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-74
CWE-74

Связанные уязвимости

github
больше 3 лет назад

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.

EPSS

Процентиль: 84%
0.02198
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-74
CWE-74