Description
In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.
Published: 2022-05-02
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade version to v5.3.8 or higher

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-3452 In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.
Github GHSA Github GHSA GHSA-9vh6-qfv6-vcqp snipe-IT vulnerable to host header injection
History

No history.

Subscriptions

Snipeitapp Snipe-it
cve-icon MITRE

Status: PUBLISHED

Assigner: Mend

Published:

Updated: 2024-09-16T22:39:57.099Z

Reserved: 2022-01-10T00:00:00.000Z

Link: CVE-2022-23064

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-02T13:15:08.170

Modified: 2024-11-21T06:47:54.833

Link: CVE-2022-23064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses